Starting Load/Save RF Kill Switch Status... [ OK ] Started Load/Save RF Kill Switch Status. Debian GNU/Linux 9 syzkaller ttyS0 syzkaller login: [ 24.108464] IPVS: ftp: loaded support on port[0] = 21 [ 24.636401] can: request_module (can-proto-0) failed. [ 24.680909] can: request_module (can-proto-0) failed. [ 24.691327] can: request_module (can-proto-0) failed. Warning: Permanently added '10.128.10.3' (ECDSA) to the list of known hosts. 2021/08/06 01:52:03 parsed 1 programs 2021/08/06 01:52:03 executed programs: 0 [ 31.551937] IPVS: ftp: loaded support on port[0] = 21 [ 31.557212] IPVS: ftp: loaded support on port[0] = 21 [ 31.583615] IPVS: ftp: loaded support on port[0] = 21 [ 31.612099] IPVS: ftp: loaded support on port[0] = 21 [ 31.646114] IPVS: ftp: loaded support on port[0] = 21 [ 31.714499] IPVS: ftp: loaded support on port[0] = 21 [ 31.756178] chnl_net:caif_netlink_parms(): no params data found [ 31.942087] chnl_net:caif_netlink_parms(): no params data found [ 31.961729] chnl_net:caif_netlink_parms(): no params data found [ 31.976569] chnl_net:caif_netlink_parms(): no params data found [ 31.999691] chnl_net:caif_netlink_parms(): no params data found [ 32.102310] chnl_net:caif_netlink_parms(): no params data found [ 32.153892] bridge0: port 1(bridge_slave_0) entered blocking state [ 32.168004] bridge0: port 1(bridge_slave_0) entered disabled state [ 32.176103] device bridge_slave_0 entered promiscuous mode [ 32.192474] bridge0: port 2(bridge_slave_1) entered blocking state [ 32.204712] bridge0: port 2(bridge_slave_1) entered disabled state [ 32.212487] device bridge_slave_1 entered promiscuous mode [ 32.226679] bridge0: port 1(bridge_slave_0) entered blocking state [ 32.233290] bridge0: port 1(bridge_slave_0) entered disabled state [ 32.242080] device bridge_slave_0 entered promiscuous mode [ 32.248328] bridge0: port 1(bridge_slave_0) entered blocking state [ 32.255578] bridge0: port 1(bridge_slave_0) entered disabled state [ 32.263773] device bridge_slave_0 entered promiscuous mode [ 32.277604] bridge0: port 1(bridge_slave_0) entered blocking state [ 32.285126] bridge0: port 1(bridge_slave_0) entered disabled state [ 32.292507] device bridge_slave_0 entered promiscuous mode [ 32.303362] bridge0: port 2(bridge_slave_1) entered blocking state [ 32.310113] bridge0: port 2(bridge_slave_1) entered disabled state [ 32.317163] device bridge_slave_1 entered promiscuous mode [ 32.336974] bridge0: port 2(bridge_slave_1) entered blocking state [ 32.343569] bridge0: port 2(bridge_slave_1) entered disabled state [ 32.351630] device bridge_slave_1 entered promiscuous mode [ 32.358062] bridge0: port 2(bridge_slave_1) entered blocking state [ 32.365634] bridge0: port 2(bridge_slave_1) entered disabled state [ 32.374605] device bridge_slave_1 entered promiscuous mode [ 32.394725] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 32.416584] bridge0: port 1(bridge_slave_0) entered blocking state [ 32.424082] bridge0: port 1(bridge_slave_0) entered disabled state [ 32.431859] device bridge_slave_0 entered promiscuous mode [ 32.439770] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 32.452265] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 32.460579] bridge0: port 1(bridge_slave_0) entered blocking state [ 32.466990] bridge0: port 1(bridge_slave_0) entered disabled state [ 32.474288] device bridge_slave_0 entered promiscuous mode [ 32.485016] bridge0: port 2(bridge_slave_1) entered blocking state [ 32.491927] bridge0: port 2(bridge_slave_1) entered disabled state [ 32.499574] device bridge_slave_1 entered promiscuous mode [ 32.505805] bridge0: port 2(bridge_slave_1) entered blocking state [ 32.514868] bridge0: port 2(bridge_slave_1) entered disabled state [ 32.522438] device bridge_slave_1 entered promiscuous mode [ 32.530137] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 32.538939] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 32.552222] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 32.564853] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 32.593826] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 32.626527] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 32.640675] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 32.649336] team0: Port device team_slave_0 added [ 32.654848] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 32.663880] team0: Port device team_slave_0 added [ 32.670257] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 32.679085] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 32.686693] team0: Port device team_slave_0 added [ 32.692342] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 32.700319] team0: Port device team_slave_0 added [ 32.706203] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 32.716081] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 32.723935] team0: Port device team_slave_1 added [ 32.729352] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 32.736927] team0: Port device team_slave_1 added [ 32.743267] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 32.751810] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 32.759599] team0: Port device team_slave_1 added [ 32.764849] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 32.772660] team0: Port device team_slave_1 added [ 32.822049] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 32.829344] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 32.856372] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 32.872163] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 32.880994] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 32.911288] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 32.922577] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 32.930596] team0: Port device team_slave_0 added [ 32.939961] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 32.947203] team0: Port device team_slave_0 added [ 32.953578] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 32.960547] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 32.986687] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 32.998288] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 33.004741] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 33.030672] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 33.042161] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 33.049372] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 33.075809] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 33.087008] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 33.094566] team0: Port device team_slave_1 added [ 33.100983] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 33.107449] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 33.135011] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 33.146967] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 33.154774] team0: Port device team_slave_1 added [ 33.160449] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 33.169083] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 33.175610] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 33.202465] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 33.213948] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 33.225308] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 33.235387] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 33.242023] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 33.267781] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 33.282305] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 33.289657] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 33.297271] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 33.305277] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 33.330415] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 33.352286] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 33.358797] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 33.385086] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 33.396513] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 33.403929] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 33.430206] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 33.480133] device hsr_slave_0 entered promiscuous mode [ 33.517931] device hsr_slave_1 entered promiscuous mode [ 33.620494] device hsr_slave_0 entered promiscuous mode [ 33.667851] device hsr_slave_1 entered promiscuous mode [ 33.749239] device hsr_slave_0 entered promiscuous mode [ 33.787731] device hsr_slave_1 entered promiscuous mode [ 33.828111] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 33.834649] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 33.862128] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 33.873670] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 33.880449] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 33.906405] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 33.923049] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 33.930022] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 33.937657] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 33.945911] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 33.953340] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 33.999006] device hsr_slave_0 entered promiscuous mode [ 34.037584] device hsr_slave_1 entered promiscuous mode [ 34.077653] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 34.084665] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 34.092752] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 34.100320] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 34.108077] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 34.115567] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 34.127951] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 34.228996] device hsr_slave_0 entered promiscuous mode [ 34.247330] device hsr_slave_1 entered promiscuous mode [ 34.358921] device hsr_slave_0 entered promiscuous mode [ 34.397393] device hsr_slave_1 entered promiscuous mode [ 34.459862] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 34.472658] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 34.488194] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 34.505578] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 34.690575] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 34.723543] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 34.748982] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 34.758308] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 34.770781] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 34.789228] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 34.866686] 8021q: adding VLAN 0 to HW filter on device bond0 [ 34.878898] 8021q: adding VLAN 0 to HW filter on device bond0 [ 34.896323] 8021q: adding VLAN 0 to HW filter on device bond0 [ 34.906838] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 34.922950] 8021q: adding VLAN 0 to HW filter on device bond0 [ 34.930893] 8021q: adding VLAN 0 to HW filter on device bond0 [ 34.940336] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 34.952579] 8021q: adding VLAN 0 to HW filter on device bond0 [ 34.960934] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 34.970036] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 34.979937] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 34.987119] 8021q: adding VLAN 0 to HW filter on device team0 [ 34.994549] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 35.003006] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 35.010906] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 35.021962] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 35.029245] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 35.036118] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 35.047587] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 35.055784] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 35.065045] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 35.073465] 8021q: adding VLAN 0 to HW filter on device team0 [ 35.081090] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 35.090422] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 35.098410] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 35.105314] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 35.112312] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 35.119756] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 35.127311] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 35.135151] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 35.143638] bridge0: port 1(bridge_slave_0) entered blocking state [ 35.150647] bridge0: port 1(bridge_slave_0) entered forwarding state [ 35.159225] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 35.167802] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 35.175077] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 35.181279] 8021q: adding VLAN 0 to HW filter on device team0 [ 35.190498] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 35.198838] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 35.208943] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 35.218218] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 35.225558] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 35.233298] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 35.241402] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 35.250088] bridge0: port 1(bridge_slave_0) entered blocking state [ 35.256601] bridge0: port 1(bridge_slave_0) entered forwarding state [ 35.264399] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 35.272632] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 35.280565] bridge0: port 2(bridge_slave_1) entered blocking state [ 35.286979] bridge0: port 2(bridge_slave_1) entered forwarding state [ 35.293866] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 35.302912] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 35.309768] 8021q: adding VLAN 0 to HW filter on device team0 [ 35.318627] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 35.330341] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 35.339616] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 35.346072] 8021q: adding VLAN 0 to HW filter on device team0 [ 35.353320] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 35.363346] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 35.371360] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 35.377651] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 35.388621] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 35.396121] bridge0: port 1(bridge_slave_0) entered blocking state [ 35.402954] bridge0: port 1(bridge_slave_0) entered forwarding state [ 35.412816] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 35.420716] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 35.430877] bridge0: port 2(bridge_slave_1) entered blocking state [ 35.437294] bridge0: port 2(bridge_slave_1) entered forwarding state [ 35.444052] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 35.454552] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 35.462245] bridge0: port 1(bridge_slave_0) entered blocking state [ 35.468661] bridge0: port 1(bridge_slave_0) entered forwarding state [ 35.478082] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 35.485869] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 35.494866] bridge0: port 2(bridge_slave_1) entered blocking state [ 35.502195] bridge0: port 2(bridge_slave_1) entered forwarding state [ 35.511658] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 35.518908] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 35.526867] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 35.533888] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 35.542050] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 35.544183] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 35.546069] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 35.547209] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 35.549075] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 35.550810] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 35.552604] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 35.554444] IPv6: ADDRCONF(NETDEV_UP): veth0_to_hsr: link is not ready [ 35.555643] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 35.558722] IPv6: ADDRCONF(NETDEV_UP): veth1_to_hsr: link is not ready [ 35.629168] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 35.639652] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 35.650517] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 35.660892] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 35.667880] 8021q: adding VLAN 0 to HW filter on device team0 [ 35.676657] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 35.683924] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 35.692134] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 35.700060] bridge0: port 2(bridge_slave_1) entered blocking state [ 35.706797] bridge0: port 2(bridge_slave_1) entered forwarding state [ 35.713575] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 35.721885] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 35.730283] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 35.738249] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 35.746122] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 35.754291] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 35.762565] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 35.770890] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 35.778741] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 35.787683] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 35.795688] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 35.803917] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 35.811542] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 35.820074] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 35.828141] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 35.835828] bridge0: port 1(bridge_slave_0) entered blocking state [ 35.842235] bridge0: port 1(bridge_slave_0) entered forwarding state [ 35.850870] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 35.863491] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 35.874417] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 35.884120] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 35.893667] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 35.902599] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 35.911490] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 35.920033] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 35.930260] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 35.940200] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 35.950719] bridge0: port 1(bridge_slave_0) entered blocking state [ 35.957214] bridge0: port 1(bridge_slave_0) entered forwarding state [ 35.967353] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 35.975099] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 35.984925] bridge0: port 2(bridge_slave_1) entered blocking state [ 35.991806] bridge0: port 2(bridge_slave_1) entered forwarding state [ 36.001471] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 36.010467] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 36.018456] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 36.026416] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 36.034205] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 36.042609] bridge0: port 2(bridge_slave_1) entered blocking state [ 36.049385] bridge0: port 2(bridge_slave_1) entered forwarding state [ 36.057109] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 36.068618] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 36.078488] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 36.088750] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 36.096801] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 36.104453] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 36.112001] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 36.121085] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 36.129612] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 36.137943] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 36.145578] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 36.153839] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 36.162620] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 36.171767] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 36.181104] IPv6: ADDRCONF(NETDEV_UP): vxcan0: link is not ready [ 36.189140] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 36.198881] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 36.209810] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 36.217866] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 36.227218] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 36.235186] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 36.243782] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 36.252413] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 36.260603] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 36.269155] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 36.277652] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 36.287344] IPv6: ADDRCONF(NETDEV_UP): veth0_to_hsr: link is not ready [ 36.295515] IPv6: ADDRCONF(NETDEV_UP): veth1_to_hsr: link is not ready [ 36.305879] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 36.314885] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 36.322363] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 36.332193] IPv6: ADDRCONF(NETDEV_UP): veth0_to_hsr: link is not ready [ 36.340325] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 36.347815] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 36.355389] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 36.364244] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 36.372186] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 36.380142] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 36.388468] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 36.396707] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 36.403697] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 36.410847] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 36.418843] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 36.426758] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 36.436198] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 36.444735] IPv6: ADDRCONF(NETDEV_UP): veth0_to_hsr: link is not ready [ 36.457070] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 36.465505] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 36.474833] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 36.481298] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 36.489887] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 36.498059] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 36.506353] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 36.514005] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 36.522552] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 36.530430] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 36.539036] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 36.548168] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 36.557689] IPv6: ADDRCONF(NETDEV_UP): veth1_to_hsr: link is not ready [ 36.565963] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 36.573588] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 36.581974] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 36.590693] IPv6: ADDRCONF(NETDEV_UP): veth1_to_hsr: link is not ready [ 36.600467] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 36.620148] IPv6: ADDRCONF(NETDEV_UP): veth0_virt_wifi: link is not ready [ 36.628382] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 36.639859] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 36.648307] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 36.656059] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 36.663960] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 36.673107] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 36.682839] IPv6: ADDRCONF(NETDEV_UP): veth0_to_hsr: link is not ready [ 36.691448] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 36.698988] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 36.708742] IPv6: ADDRCONF(NETDEV_UP): veth0_to_hsr: link is not ready [ 36.717041] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 36.723417] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 36.734229] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 36.742006] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 36.752550] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 36.760853] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 36.773969] IPv6: ADDRCONF(NETDEV_UP): veth1_to_hsr: link is not ready [ 36.783404] IPv6: ADDRCONF(NETDEV_UP): veth1_virt_wifi: link is not ready [ 36.793086] IPv6: ADDRCONF(NETDEV_UP): vxcan0: link is not ready [ 36.809166] IPv6: ADDRCONF(NETDEV_UP): vxcan0: link is not ready [ 36.816111] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 36.823768] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 36.832200] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 36.840470] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 36.849749] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 36.857167] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 36.866025] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 36.873542] IPv6: ADDRCONF(NETDEV_UP): vxcan0: link is not ready [ 36.883981] IPv6: ADDRCONF(NETDEV_UP): veth1_to_hsr: link is not ready [ 36.892419] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 36.899422] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 36.906383] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 36.914197] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 36.928700] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 36.939645] IPv6: ADDRCONF(NETDEV_UP): veth0_vlan: link is not ready [ 36.950132] IPv6: ADDRCONF(NETDEV_UP): vlan0: link is not ready [ 36.956982] IPv6: ADDRCONF(NETDEV_UP): vlan1: link is not ready [ 36.964309] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 36.971434] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 36.985994] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 36.995629] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 37.003117] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 37.011337] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 37.018309] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 37.025422] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 37.035939] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 37.054448] IPv6: ADDRCONF(NETDEV_UP): vxcan0: link is not ready [ 37.062503] IPv6: ADDRCONF(NETDEV_UP): veth1_vlan: link is not ready [ 37.077327] IPv6: ADDRCONF(NETDEV_UP): veth0_virt_wifi: link is not ready [ 37.086207] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 37.094966] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 37.102736] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 37.110676] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 37.118437] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 37.126286] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 37.133895] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 37.142093] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 37.152709] device veth0_vlan entered promiscuous mode [ 37.163654] IPv6: ADDRCONF(NETDEV_UP): veth0_virt_wifi: link is not ready [ 37.174023] IPv6: ADDRCONF(NETDEV_UP): vxcan0: link is not ready [ 37.184889] IPv6: ADDRCONF(NETDEV_UP): veth1_virt_wifi: link is not ready [ 37.195995] IPv6: ADDRCONF(NETDEV_UP): veth0_virt_wifi: link is not ready [ 37.204712] IPv6: ADDRCONF(NETDEV_UP): veth1_virt_wifi: link is not ready [ 37.222116] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 37.228714] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 37.237507] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 37.245610] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 37.253412] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 37.261781] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 37.269210] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 37.278154] device veth1_vlan entered promiscuous mode [ 37.286624] IPv6: ADDRCONF(NETDEV_UP): veth1_virt_wifi: link is not ready [ 37.299473] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 37.313482] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 37.325459] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 37.333797] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 37.351627] IPv6: ADDRCONF(NETDEV_UP): veth0_virt_wifi: link is not ready [ 37.368744] IPv6: ADDRCONF(NETDEV_UP): veth0_virt_wifi: link is not ready [ 37.379397] IPv6: ADDRCONF(NETDEV_UP): veth0_macvtap: link is not ready [ 37.391356] IPv6: ADDRCONF(NETDEV_UP): veth0_vlan: link is not ready [ 37.399313] IPv6: ADDRCONF(NETDEV_UP): vlan0: link is not ready [ 37.407143] IPv6: ADDRCONF(NETDEV_UP): vlan1: link is not ready [ 37.417143] IPv6: ADDRCONF(NETDEV_UP): veth1_virt_wifi: link is not ready [ 37.425722] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 37.434030] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 37.444814] IPv6: ADDRCONF(NETDEV_UP): veth1_macvtap: link is not ready [ 37.456449] IPv6: ADDRCONF(NETDEV_UP): veth0_vlan: link is not ready [ 37.464282] IPv6: ADDRCONF(NETDEV_UP): vlan0: link is not ready [ 37.472045] IPv6: ADDRCONF(NETDEV_UP): vlan1: link is not ready [ 37.481459] IPv6: ADDRCONF(NETDEV_UP): veth1_virt_wifi: link is not ready [ 37.491031] IPv6: ADDRCONF(NETDEV_UP): veth0_vlan: link is not ready [ 37.499512] IPv6: ADDRCONF(NETDEV_UP): vlan0: link is not ready [ 37.507600] IPv6: ADDRCONF(NETDEV_UP): vlan1: link is not ready [ 37.514213] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 37.523692] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 37.532579] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 37.541579] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 37.551660] device veth0_macvtap entered promiscuous mode [ 37.559036] IPv6: ADDRCONF(NETDEV_UP): macvtap0: link is not ready [ 37.567643] IPv6: ADDRCONF(NETDEV_UP): veth1_vlan: link is not ready [ 37.576151] IPv6: ADDRCONF(NETDEV_UP): veth1_vlan: link is not ready [ 37.586792] IPv6: ADDRCONF(NETDEV_UP): veth1_vlan: link is not ready [ 37.594494] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 37.602813] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 37.611552] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 37.619581] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 37.628100] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 37.636168] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 37.643608] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 37.653156] device veth0_vlan entered promiscuous mode [ 37.661100] device veth1_macvtap entered promiscuous mode [ 37.667708] IPv6: ADDRCONF(NETDEV_UP): macsec0: link is not ready [ 37.678843] IPv6: ADDRCONF(NETDEV_UP): veth0_vlan: link is not ready [ 37.688074] IPv6: ADDRCONF(NETDEV_UP): vlan0: link is not ready [ 37.696178] IPv6: ADDRCONF(NETDEV_UP): vlan1: link is not ready [ 37.702703] device veth0_vlan entered promiscuous mode [ 37.711404] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 37.719057] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 37.728692] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 37.735925] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 37.743102] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 37.752946] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 37.760256] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 37.771743] device veth1_vlan entered promiscuous mode [ 37.778534] IPv6: ADDRCONF(NETDEV_UP): macvlan0: link is not ready [ 37.786808] device veth0_vlan entered promiscuous mode [ 37.793496] IPv6: ADDRCONF(NETDEV_UP): veth0_to_batadv: link is not ready [ 37.805701] IPv6: ADDRCONF(NETDEV_UP): veth0_vlan: link is not ready [ 37.812897] IPv6: ADDRCONF(NETDEV_UP): vlan0: link is not ready [ 37.820260] IPv6: ADDRCONF(NETDEV_UP): vlan1: link is not ready [ 37.845030] IPv6: ADDRCONF(NETDEV_UP): macvlan1: link is not ready [ 37.852837] IPv6: ADDRCONF(NETDEV_UP): veth1_vlan: link is not ready [ 37.862302] IPv6: ADDRCONF(NETDEV_UP): veth1_to_batadv: link is not ready [ 37.872961] IPv6: ADDRCONF(NETDEV_UP): batadv_slave_0: link is not ready [ 37.883221] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 37.892792] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 37.902823] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 37.910901] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 37.920812] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 37.928670] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 37.939554] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 37.948783] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 37.958504] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 37.967133] device veth0_vlan entered promiscuous mode [ 37.977082] device veth1_vlan entered promiscuous mode [ 37.983173] IPv6: ADDRCONF(NETDEV_UP): macvlan0: link is not ready [ 37.991010] IPv6: ADDRCONF(NETDEV_UP): veth1_vlan: link is not ready [ 38.000051] device veth0_vlan entered promiscuous mode [ 38.009180] device veth1_vlan entered promiscuous mode [ 38.015424] IPv6: ADDRCONF(NETDEV_UP): macvlan0: link is not ready [ 38.026144] IPv6: ADDRCONF(NETDEV_UP): macvlan1: link is not ready [ 38.032989] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 38.040604] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 38.049431] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 38.056867] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 38.064231] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 38.072703] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 38.079791] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 38.097174] IPv6: ADDRCONF(NETDEV_UP): batadv_slave_1: link is not ready [ 38.104409] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 38.112408] device veth1_vlan entered promiscuous mode [ 38.119084] IPv6: ADDRCONF(NETDEV_UP): macvlan0: link is not ready [ 38.128206] IPv6: ADDRCONF(NETDEV_UP): macvlan1: link is not ready [ 38.139846] IPv6: ADDRCONF(NETDEV_UP): veth0_macvtap: link is not ready [ 38.147263] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 38.154744] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 38.162124] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 38.170768] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 38.179975] device veth1_vlan entered promiscuous mode [ 38.192619] IPv6: ADDRCONF(NETDEV_UP): veth1_macvtap: link is not ready [ 38.203343] device veth0_macvtap entered promiscuous mode [ 38.210690] IPv6: ADDRCONF(NETDEV_UP): macvtap0: link is not ready [ 38.222545] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 38.230782] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 38.249456] IPv6: ADDRCONF(NETDEV_UP): veth0_macvtap: link is not ready [ 38.259823] IPv6: ADDRCONF(NETDEV_UP): veth0_macvtap: link is not ready [ 38.268280] device veth1_macvtap entered promiscuous mode [ 38.274259] IPv6: ADDRCONF(NETDEV_UP): macsec0: link is not ready [ 38.280893] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 38.288588] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 38.299583] IPv6: ADDRCONF(NETDEV_UP): veth0_macvtap: link is not ready [ 38.309199] IPv6: ADDRCONF(NETDEV_UP): veth0_macvtap: link is not ready [ 38.319196] IPv6: ADDRCONF(NETDEV_UP): veth1_macvtap: link is not ready [ 38.329347] IPv6: ADDRCONF(NETDEV_UP): veth0_to_batadv: link is not ready [ 38.347756] IPv6: ADDRCONF(NETDEV_UP): veth1_macvtap: link is not ready [ 38.357576] IPv6: ADDRCONF(NETDEV_UP): veth1_macvtap: link is not ready [ 38.367689] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 38.375957] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 38.383941] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 38.392133] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 38.400172] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 38.409093] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 38.418633] device veth0_macvtap entered promiscuous mode [ 38.426104] IPv6: ADDRCONF(NETDEV_UP): macvtap0: link is not ready [ 38.436999] IPv6: ADDRCONF(NETDEV_UP): veth1_macvtap: link is not ready [ 38.444561] device veth0_macvtap entered promiscuous mode [ 38.450774] IPv6: ADDRCONF(NETDEV_UP): macvtap0: link is not ready [ 38.458864] IPv6: ADDRCONF(NETDEV_UP): veth1_to_batadv: link is not ready [ 38.468929] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 38.479069] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 38.489649] IPv6: ADDRCONF(NETDEV_UP): batadv_slave_0: link is not ready [ 38.497114] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 38.505324] device veth0_macvtap entered promiscuous mode [ 38.511675] IPv6: ADDRCONF(NETDEV_UP): macvtap0: link is not ready [ 38.520612] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 38.528781] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 38.536772] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 38.544162] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 38.552710] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 38.560836] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 38.569026] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 38.579039] device veth0_macvtap entered promiscuous mode [ 38.586090] IPv6: ADDRCONF(NETDEV_UP): macvtap0: link is not ready [ 38.594243] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 38.604752] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 38.615159] IPv6: ADDRCONF(NETDEV_UP): batadv_slave_1: link is not ready [ 38.622184] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 38.633260] device veth1_macvtap entered promiscuous mode [ 38.640430] IPv6: ADDRCONF(NETDEV_UP): macsec0: link is not ready [ 38.658341] device veth1_macvtap entered promiscuous mode [ 38.665041] IPv6: ADDRCONF(NETDEV_UP): macsec0: link is not ready [ 38.671784] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 38.682249] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 38.692860] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 38.700779] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 38.709459] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 38.719488] device veth1_macvtap entered promiscuous mode [ 38.726424] IPv6: ADDRCONF(NETDEV_UP): macsec0: link is not ready [ 38.733997] device veth1_macvtap entered promiscuous mode [ 38.740594] IPv6: ADDRCONF(NETDEV_UP): macsec0: link is not ready [ 38.751213] IPv6: ADDRCONF(NETDEV_UP): veth0_to_batadv: link is not ready [ 38.767387] IPv6: ADDRCONF(NETDEV_UP): veth0_to_batadv: link is not ready [ 38.777403] IPv6: ADDRCONF(NETDEV_UP): veth0_to_batadv: link is not ready [ 38.787108] IPv6: ADDRCONF(NETDEV_UP): veth0_to_batadv: link is not ready [ 38.797626] IPv6: ADDRCONF(NETDEV_UP): veth1_to_batadv: link is not ready [ 38.808280] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 38.819121] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 38.829318] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 38.840286] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 38.851184] IPv6: ADDRCONF(NETDEV_UP): batadv_slave_0: link is not ready [ 38.858921] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 38.869237] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 38.879315] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 38.889468] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 38.899897] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 38.910218] IPv6: ADDRCONF(NETDEV_UP): batadv_slave_1: link is not ready [ 38.918220] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 38.926110] IPv6: ADDRCONF(NETDEV_UP): veth1_to_batadv: link is not ready [ 38.933454] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 38.940853] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 38.951679] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 38.959704] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 38.968345] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 38.977255] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 38.985978] IPv6: ADDRCONF(NETDEV_UP): veth1_to_batadv: link is not ready [ 39.000950] IPv6: ADDRCONF(NETDEV_UP): veth1_to_batadv: link is not ready [ 39.011384] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 39.022849] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 39.033641] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 39.043708] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 39.054778] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 39.064661] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 39.075424] IPv6: ADDRCONF(NETDEV_UP): batadv_slave_0: link is not ready [ 39.082350] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 39.095509] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 39.108174] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 39.116029] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 39.137340] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 39.150427] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 39.160156] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 39.162319] FAULT_INJECTION: forcing a failure. [ 39.162319] name failslab, interval 1, probability 0, space 0, times 1 [ 39.170556] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 39.186605] CPU: 0 PID: 7121 Comm: syz-executor.0 Not tainted 4.19.201-syzkaller #0 [ 39.191561] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 39.198954] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 39.198957] Call Trace: [ 39.198972] dump_stack+0x17c/0x226 [ 39.198982] should_fail.cold.2+0x5/0xa [ 39.198989] ? setup_fault_attr+0x220/0x220 [ 39.198994] ? _raw_spin_unlock_irqrestore+0x82/0xd0 [ 39.198999] ? depot_save_stack+0x292/0x460 [ 39.199005] ? lockdep_hardirqs_on+0x3bb/0x5b0 [ 39.199009] ? _raw_spin_unlock_irqrestore+0x82/0xd0 [ 39.199018] __should_failslab+0xba/0xf0 [ 39.199025] should_failslab+0x9/0x20 [ 39.199030] __kmalloc+0x6f/0x3d0 [ 39.199036] ? gcmaes_encrypt.constprop.5+0x630/0xda0 [ 39.199042] gcmaes_encrypt.constprop.5+0x630/0xda0 [ 39.199046] ? kasan_kmalloc.part.1+0x62/0xf0 [ 39.199049] ? kasan_kmalloc+0xaf/0xc0 [ 39.199053] ? __kmalloc+0x15d/0x3d0 [ 39.199059] ? tls_push_record+0xff/0x15f0 [ 39.199063] ? tls_sw_sendmsg+0xb35/0x1010 [ 39.199070] ? gcmaes_crypt_by_sg.constprop.6+0x1430/0x1430 [ 39.199084] ? mark_held_locks+0x130/0x130 [ 39.199088] ? mark_held_locks+0xc7/0x130 [ 39.199095] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 39.199100] ? lockdep_hardirqs_on+0x3bb/0x5b0 2021/08/06 01:52:11 executed programs: 6 [ 39.199105] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 39.199116] generic_gcmaes_encrypt+0xfd/0x150 [ 39.199121] ? generic_gcmaes_encrypt+0xfd/0x150 [ 39.199125] ? helper_rfc4106_encrypt+0x450/0x450 [ 39.199133] ? rcu_read_lock_sched_held+0x108/0x120 [ 39.199139] gcmaes_wrapper_encrypt+0x109/0x180 [ 39.199145] tls_push_record+0x9ae/0x15f0 [ 39.199160] tls_sw_sendmsg+0xb35/0x1010 [ 39.199175] ? tls_sw_push_pending_record+0x10/0x10 [ 39.199182] ? do_dup2+0x3f0/0x3f0 [ 39.199185] ? kasan_check_read+0x11/0x20 [ 39.199196] ? aa_sock_msg_perm.isra.2+0x88/0x130 [ 39.199206] inet_sendmsg+0x108/0x440 [ 39.199212] ? security_socket_sendmsg+0x4a/0x90 [ 39.199217] ? inet_recvmsg+0x580/0x580 [ 39.199223] sock_sendmsg+0xac/0xf0 [ 39.199230] __sys_sendto+0x1f2/0x2e0 [ 39.199237] ? __ia32_sys_getpeername+0xb0/0xb0 [ 39.199243] ? kernel_read+0x130/0x130 [ 39.199247] ? __f_unlock_pos+0xd/0x10 [ 39.199252] ? lock_downgrade+0x860/0x860 [ 39.199263] ? kasan_check_write+0x14/0x20 [ 39.199268] ? __mutex_unlock_slowpath+0xe8/0x6a0 [ 39.199279] ? __sb_end_write+0xa4/0xd0 [ 39.199285] ? kasan_check_write+0x14/0x20 [ 39.199289] ? fput+0x18/0x120 [ 39.199294] ? ksys_write+0x1ce/0x260 [ 39.199300] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 39.199305] ? do_syscall_64+0x21/0x4e0 [ 39.199312] __x64_sys_sendto+0xdc/0x1a0 [ 39.199319] do_syscall_64+0xd0/0x4e0 [ 39.199327] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 39.199332] RIP: 0033:0x4645a9 [ 39.199339] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 39.224479] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 39.226037] RSP: 002b:00007fe6ff8b0198 EFLAGS: 00000246 ORIG_RAX: 000000000000002c [ 39.230988] IPv6: ADDRCONF(NETDEV_UP): batadv_slave_0: link is not ready [ 39.234302] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00000000004645a9 [ 39.234305] RDX: 00000000e0ffffff RSI: 00000000200005c0 RDI: 0000000000000003 [ 39.234308] RBP: 000000000051d8e0 R08: 0000000000000000 R09: 00000000000000d8 [ 39.234311] R10: 0000000000000000 R11: 0000000000000246 R12: 000000000055bf00 [ 39.234313] R13: 00007fe6ff8b06bc R14: 0000000000000005 R15: 0000000000000001 [ 39.354668] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 39.359384] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 39.397905] FAULT_INJECTION: forcing a failure. [ 39.397905] name failslab, interval 1, probability 0, space 0, times 0 [ 39.407034] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 39.416588] CPU: 0 PID: 7131 Comm: syz-executor.0 Not tainted 4.19.201-syzkaller #0 [ 39.419738] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 39.423751] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 39.423754] Call Trace: [ 39.431498] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 39.432000] dump_stack+0x17c/0x226 [ 39.435587] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 39.438981] should_fail.cold.2+0x5/0xa [ 39.438991] ? setup_fault_attr+0x220/0x220 [ 39.443866] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 39.447798] ? __kernel_text_address+0xd/0x40 [ 39.447806] ? unwind_get_return_address+0x58/0xa0 [ 39.447815] __should_failslab+0xba/0xf0 [ 39.447823] should_failslab+0x9/0x20 [ 39.447827] __kmalloc+0x6f/0x3d0 [ 39.447833] ? gcmaes_encrypt.constprop.5+0x630/0xda0 [ 39.447840] gcmaes_encrypt.constprop.5+0x630/0xda0 [ 39.447845] ? kasan_kmalloc.part.1+0x62/0xf0 [ 39.447849] ? kasan_kmalloc+0xaf/0xc0 [ 39.447852] ? __kmalloc+0x15d/0x3d0 [ 39.447858] ? tls_push_record+0xff/0x15f0 [ 39.447862] ? tls_sw_sendmsg+0xb35/0x1010 [ 39.447869] ? gcmaes_crypt_by_sg.constprop.6+0x1430/0x1430 [ 39.447882] ? mark_held_locks+0x130/0x130 [ 39.447886] ? mark_held_locks+0xc7/0x130 [ 39.447893] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 39.447898] ? lockdep_hardirqs_on+0x3bb/0x5b0 [ 39.447903] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 39.447914] generic_gcmaes_encrypt+0xfd/0x150 [ 39.447918] ? generic_gcmaes_encrypt+0xfd/0x150 [ 39.447923] ? helper_rfc4106_encrypt+0x450/0x450 [ 39.447930] ? rcu_read_lock_sched_held+0x108/0x120 [ 39.447938] gcmaes_wrapper_encrypt+0x109/0x180 [ 39.447944] tls_push_record+0x9ae/0x15f0 [ 39.447957] tls_sw_sendmsg+0xb35/0x1010 [ 39.447972] ? tls_sw_push_pending_record+0x10/0x10 [ 39.447978] ? do_dup2+0x3f0/0x3f0 [ 39.447981] ? kasan_check_read+0x11/0x20 [ 39.447991] ? aa_sock_msg_perm.isra.2+0x88/0x130 [ 39.447999] inet_sendmsg+0x108/0x440 [ 39.448005] ? security_socket_sendmsg+0x4a/0x90 [ 39.448010] ? inet_recvmsg+0x580/0x580 [ 39.448017] sock_sendmsg+0xac/0xf0 [ 39.448024] __sys_sendto+0x1f2/0x2e0 [ 39.448031] ? __ia32_sys_getpeername+0xb0/0xb0 [ 39.457035] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 39.461284] ? kernel_read+0x130/0x130 [ 39.461290] ? __f_unlock_pos+0xd/0x10 [ 39.461298] ? lock_downgrade+0x860/0x860 [ 39.466335] IPv6: ADDRCONF(NETDEV_UP): batadv_slave_1: link is not ready [ 39.483457] ? kasan_check_write+0x14/0x20 [ 39.483465] ? __mutex_unlock_slowpath+0xe8/0x6a0 [ 39.483477] ? __sb_end_write+0xa4/0xd0 [ 39.483482] ? kasan_check_write+0x14/0x20 [ 39.483487] ? fput+0x18/0x120 [ 39.483492] ? ksys_write+0x1ce/0x260 [ 39.483500] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 39.483505] ? do_syscall_64+0x21/0x4e0 [ 39.483514] __x64_sys_sendto+0xdc/0x1a0 [ 39.483521] do_syscall_64+0xd0/0x4e0 [ 39.483529] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 39.483534] RIP: 0033:0x4645a9 [ 39.483541] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 39.483544] RSP: 002b:00007fe6ff8b0198 EFLAGS: 00000246 ORIG_RAX: 000000000000002c [ 39.483549] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00000000004645a9 [ 39.483552] RDX: 00000000e0ffffff RSI: 00000000200005c0 RDI: 0000000000000003 [ 39.483555] RBP: 000000000051d8e0 R08: 0000000000000000 R09: 00000000000000d8 [ 39.483558] R10: 0000000000000000 R11: 0000000000000246 R12: 000000000055bf00 [ 39.483561] R13: 00007fe6ff8b06bc R14: 0000000000000005 R15: 0000000000000001 [ 39.684818] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 39.692673] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 39.715293] FAULT_INJECTION: forcing a failure. [ 39.715293] name failslab, interval 1, probability 0, space 0, times 0 [ 39.985893] CPU: 1 PID: 7137 Comm: syz-executor.0 Not tainted 4.19.201-syzkaller #0 [ 39.994214] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 39.996627] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 40.003865] Call Trace: [ 40.003879] dump_stack+0x17c/0x226 [ 40.003890] should_fail.cold.2+0x5/0xa [ 40.003897] ? setup_fault_attr+0x220/0x220 [ 40.003904] ? __kernel_text_address+0xd/0x40 [ 40.003911] ? unwind_get_return_address+0x58/0xa0 [ 40.003920] __should_failslab+0xba/0xf0 [ 40.003928] should_failslab+0x9/0x20 [ 40.003932] __kmalloc+0x6f/0x3d0 [ 40.003937] ? gcmaes_encrypt.constprop.5+0x630/0xda0 [ 40.003944] gcmaes_encrypt.constprop.5+0x630/0xda0 [ 40.014572] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 40.016256] ? kasan_kmalloc.part.1+0x62/0xf0 [ 40.019943] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 40.024153] ? kasan_kmalloc+0xaf/0xc0 [ 40.024158] ? __kmalloc+0x15d/0x3d0 [ 40.024164] ? tls_push_record+0xff/0x15f0 [ 40.024168] ? tls_sw_sendmsg+0xb35/0x1010 [ 40.024177] ? gcmaes_crypt_by_sg.constprop.6+0x1430/0x1430 [ 40.024189] ? mark_held_locks+0x130/0x130 [ 40.024193] ? mark_held_locks+0xc7/0x130 [ 40.024201] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 40.024206] ? lockdep_hardirqs_on+0x3bb/0x5b0 [ 40.024210] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 40.024221] generic_gcmaes_encrypt+0xfd/0x150 [ 40.033664] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 40.038094] ? generic_gcmaes_encrypt+0xfd/0x150 [ 40.042147] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 40.045919] ? helper_rfc4106_encrypt+0x450/0x450 [ 40.045928] ? rcu_read_lock_sched_held+0x108/0x120 [ 40.045934] gcmaes_wrapper_encrypt+0x109/0x180 [ 40.045943] tls_push_record+0x9ae/0x15f0 [ 40.045957] tls_sw_sendmsg+0xb35/0x1010 [ 40.052364] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 40.054577] ? tls_sw_push_pending_record+0x10/0x10 [ 40.054585] ? do_dup2+0x3f0/0x3f0 [ 40.054590] ? kasan_check_read+0x11/0x20 [ 40.054600] ? aa_sock_msg_perm.isra.2+0x88/0x130 [ 40.054609] inet_sendmsg+0x108/0x440 [ 40.054614] ? security_socket_sendmsg+0x4a/0x90 [ 40.054619] ? inet_recvmsg+0x580/0x580 [ 40.062214] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 40.068706] sock_sendmsg+0xac/0xf0 [ 40.068714] __sys_sendto+0x1f2/0x2e0 [ 40.068720] ? __ia32_sys_getpeername+0xb0/0xb0 [ 40.068726] ? kernel_read+0x130/0x130 [ 40.068731] ? __f_unlock_pos+0xd/0x10 [ 40.068739] ? lock_downgrade+0x860/0x860 [ 40.068749] ? kasan_check_write+0x14/0x20 [ 40.068754] ? __mutex_unlock_slowpath+0xe8/0x6a0 [ 40.068765] ? __sb_end_write+0xa4/0xd0 [ 40.075675] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 40.083121] ? kasan_check_write+0x14/0x20 [ 40.087532] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 40.090685] ? fput+0x18/0x120 [ 40.095404] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 40.099117] ? ksys_write+0x1ce/0x260 [ 40.106344] IPv6: ADDRCONF(NETDEV_UP): batadv_slave_0: link is not ready [ 40.109256] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 40.114224] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 40.118308] ? do_syscall_64+0x21/0x4e0 [ 40.125433] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 40.127829] __x64_sys_sendto+0xdc/0x1a0 [ 40.132386] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 40.141639] do_syscall_64+0xd0/0x4e0 [ 40.141648] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 40.141653] RIP: 0033:0x4645a9 [ 40.141659] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 40.141661] RSP: 002b:00007fe6ff8b0198 EFLAGS: 00000246 ORIG_RAX: 000000000000002c [ 40.141667] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00000000004645a9 [ 40.141669] RDX: 00000000e0ffffff RSI: 00000000200005c0 RDI: 0000000000000003 [ 40.141672] RBP: 000000000051d8e0 R08: 0000000000000000 R09: 00000000000000d8 [ 40.141675] R10: 0000000000000000 R11: 0000000000000246 R12: 000000000055bf00 [ 40.141678] R13: 00007fe6ff8b06bc R14: 0000000000000005 R15: 0000000000000001 [ 40.385351] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 40.401719] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 40.449538] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 40.450432] FAULT_INJECTION: forcing a failure. [ 40.450432] name failslab, interval 1, probability 0, space 0, times 0 [ 40.462367] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 40.471340] CPU: 1 PID: 7143 Comm: syz-executor.0 Not tainted 4.19.201-syzkaller #0 [ 40.480023] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 40.487739] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 40.487742] Call Trace: [ 40.487754] dump_stack+0x17c/0x226 [ 40.487765] should_fail.cold.2+0x5/0xa [ 40.487773] ? setup_fault_attr+0x220/0x220 [ 40.487780] ? __kernel_text_address+0xd/0x40 [ 40.487787] ? unwind_get_return_address+0x58/0xa0 [ 40.487798] __should_failslab+0xba/0xf0 [ 40.487805] should_failslab+0x9/0x20 [ 40.487809] __kmalloc+0x6f/0x3d0 [ 40.487816] ? gcmaes_encrypt.constprop.5+0x630/0xda0 [ 40.497038] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 40.506341] gcmaes_encrypt.constprop.5+0x630/0xda0 [ 40.506348] ? kasan_kmalloc.part.1+0x62/0xf0 [ 40.506352] ? kasan_kmalloc+0xaf/0xc0 [ 40.506355] ? __kmalloc+0x15d/0x3d0 [ 40.506362] ? tls_push_record+0xff/0x15f0 [ 40.506366] ? tls_sw_sendmsg+0xb35/0x1010 [ 40.506374] ? gcmaes_crypt_by_sg.constprop.6+0x1430/0x1430 [ 40.506387] ? mark_held_locks+0x130/0x130 [ 40.509088] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 40.512656] ? mark_held_locks+0xc7/0x130 [ 40.512664] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 40.512670] ? lockdep_hardirqs_on+0x3bb/0x5b0 [ 40.512674] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 40.512684] generic_gcmaes_encrypt+0xfd/0x150 [ 40.517809] IPv6: ADDRCONF(NETDEV_UP): batadv_slave_1: link is not ready [ 40.520951] ? generic_gcmaes_encrypt+0xfd/0x150 [ 40.520957] ? helper_rfc4106_encrypt+0x450/0x450 [ 40.520967] ? rcu_read_lock_sched_held+0x108/0x120 [ 40.525536] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 40.530353] gcmaes_wrapper_encrypt+0x109/0x180 [ 40.530363] tls_push_record+0x9ae/0x15f0 [ 40.530377] tls_sw_sendmsg+0xb35/0x1010 [ 40.667990] ? tls_sw_push_pending_record+0x10/0x10 [ 40.673073] ? do_dup2+0x3f0/0x3f0 [ 40.676678] ? kasan_check_read+0x11/0x20 [ 40.680816] ? aa_sock_msg_perm.isra.2+0x88/0x130 [ 40.685636] inet_sendmsg+0x108/0x440 [ 40.689441] ? security_socket_sendmsg+0x4a/0x90 [ 40.694284] ? inet_recvmsg+0x580/0x580 [ 40.698466] sock_sendmsg+0xac/0xf0 [ 40.702131] __sys_sendto+0x1f2/0x2e0 [ 40.705912] ? __ia32_sys_getpeername+0xb0/0xb0 [ 40.710566] ? kernel_read+0x130/0x130 [ 40.714440] ? __f_unlock_pos+0xd/0x10 [ 40.718311] ? lock_downgrade+0x860/0x860 [ 40.722515] ? kasan_check_write+0x14/0x20 [ 40.726773] ? __mutex_unlock_slowpath+0xe8/0x6a0 [ 40.731610] ? __sb_end_write+0xa4/0xd0 [ 40.735744] ? kasan_check_write+0x14/0x20 [ 40.740064] ? fput+0x18/0x120 [ 40.743240] ? ksys_write+0x1ce/0x260 [ 40.747035] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 40.751783] ? do_syscall_64+0x21/0x4e0 [ 40.756474] __x64_sys_sendto+0xdc/0x1a0 [ 40.760544] do_syscall_64+0xd0/0x4e0 [ 40.764491] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 40.769760] RIP: 0033:0x4645a9 [ 40.773020] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 40.792724] RSP: 002b:00007fe6ff8b0198 EFLAGS: 00000246 ORIG_RAX: 000000000000002c [ 40.800640] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00000000004645a9 [ 40.807994] RDX: 00000000e0ffffff RSI: 00000000200005c0 RDI: 0000000000000003 [ 40.815730] RBP: 000000000051d8e0 R08: 0000000000000000 R09: 00000000000000d8 [ 40.823009] R10: 0000000000000000 R11: 0000000000000246 R12: 000000000055bf00 [ 40.830449] R13: 00007fe6ff8b06bc R14: 0000000000000005 R15: 0000000000000001 [ 40.838506] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 40.853323] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 40.861890] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 40.870171] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 40.879607] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 40.887991] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 40.896201] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 40.904383] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 40.912222] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 40.920245] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 40.929065] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 40.939375] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 40.948722] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 40.958948] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 40.969434] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 40.979596] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 40.988762] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 40.998530] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 41.007848] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 41.018404] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 41.028848] IPv6: ADDRCONF(NETDEV_UP): batadv_slave_1: link is not ready [ 41.032812] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 41.040007] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 41.055102] FAULT_INJECTION: forcing a failure. [ 41.055102] name failslab, interval 1, probability 0, space 0, times 0 [ 41.055111] CPU: 0 PID: 7147 Comm: syz-executor.0 Not tainted 4.19.201-syzkaller #0 [ 41.055114] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 41.055116] Call Trace: [ 41.055126] dump_stack+0x17c/0x226 [ 41.055137] should_fail.cold.2+0x5/0xa [ 41.055146] ? setup_fault_attr+0x220/0x220 [ 41.055154] ? __kernel_text_address+0xd/0x40 [ 41.055161] ? unwind_get_return_address+0x58/0xa0 [ 41.055172] __should_failslab+0xba/0xf0 [ 41.055180] should_failslab+0x9/0x20 [ 41.055185] __kmalloc+0x6f/0x3d0 [ 41.055191] ? gcmaes_encrypt.constprop.5+0x630/0xda0 [ 41.055203] gcmaes_encrypt.constprop.5+0x630/0xda0 [ 41.055208] ? kasan_kmalloc.part.1+0x62/0xf0 [ 41.055211] ? kasan_kmalloc+0xaf/0xc0 [ 41.055214] ? __kmalloc+0x15d/0x3d0 [ 41.055221] ? tls_push_record+0xff/0x15f0 [ 41.055224] ? tls_sw_sendmsg+0xb35/0x1010 [ 41.055233] ? gcmaes_crypt_by_sg.constprop.6+0x1430/0x1430 [ 41.055246] ? mark_held_locks+0x130/0x130 [ 41.055250] ? mark_held_locks+0xc7/0x130 [ 41.055258] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 41.055264] ? lockdep_hardirqs_on+0x3bb/0x5b0 [ 41.055268] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 41.055278] generic_gcmaes_encrypt+0xfd/0x150 [ 41.055282] ? generic_gcmaes_encrypt+0xfd/0x150 [ 41.055286] ? helper_rfc4106_encrypt+0x450/0x450 [ 41.055294] ? rcu_read_lock_sched_held+0x108/0x120 [ 41.055300] gcmaes_wrapper_encrypt+0x109/0x180 [ 41.055306] tls_push_record+0x9ae/0x15f0 [ 41.055328] tls_sw_sendmsg+0xb35/0x1010 [ 41.055342] ? tls_sw_push_pending_record+0x10/0x10 [ 41.055347] ? do_dup2+0x3f0/0x3f0 [ 41.055350] ? kasan_check_read+0x11/0x20 [ 41.055360] ? aa_sock_msg_perm.isra.2+0x88/0x130 [ 41.055368] inet_sendmsg+0x108/0x440 [ 41.055373] ? security_socket_sendmsg+0x4a/0x90 [ 41.055377] ? inet_recvmsg+0x580/0x580 [ 41.055383] sock_sendmsg+0xac/0xf0 [ 41.055388] __sys_sendto+0x1f2/0x2e0 [ 41.055393] ? __ia32_sys_getpeername+0xb0/0xb0 [ 41.055399] ? kernel_read+0x130/0x130 [ 41.055403] ? __f_unlock_pos+0xd/0x10 [ 41.055408] ? lock_downgrade+0x860/0x860 [ 41.055417] ? kasan_check_write+0x14/0x20 [ 41.055422] ? __mutex_unlock_slowpath+0xe8/0x6a0 [ 41.055433] ? __sb_end_write+0xa4/0xd0 [ 41.055439] ? kasan_check_write+0x14/0x20 [ 41.055443] ? fput+0x18/0x120 [ 41.055447] ? ksys_write+0x1ce/0x260 [ 41.055453] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 41.055458] ? do_syscall_64+0x21/0x4e0 [ 41.055465] __x64_sys_sendto+0xdc/0x1a0 [ 41.055470] do_syscall_64+0xd0/0x4e0 [ 41.055478] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 41.055482] RIP: 0033:0x4645a9 [ 41.055487] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 41.055490] RSP: 002b:00007fe6ff8b0198 EFLAGS: 00000246 ORIG_RAX: 000000000000002c [ 41.055495] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00000000004645a9 [ 41.055497] RDX: 00000000e0ffffff RSI: 00000000200005c0 RDI: 0000000000000003 [ 41.055500] RBP: 000000000051d8e0 R08: 0000000000000000 R09: 00000000000000d8 [ 41.055502] R10: 0000000000000000 R11: 0000000000000246 R12: 000000000055bf00 [ 41.055504] R13: 00007fe6ff8b06bc R14: 0000000000000005 R15: 0000000000000001 [ 41.088051] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 41.088509] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 41.188638] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 41.199630] FAULT_INJECTION: forcing a failure. [ 41.199630] name failslab, interval 1, probability 0, space 0, times 0 [ 41.199639] CPU: 1 PID: 7179 Comm: syz-executor.0 Not tainted 4.19.201-syzkaller #0 [ 41.199643] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 41.199646] Call Trace: [ 41.199656] dump_stack+0x17c/0x226 [ 41.199667] should_fail.cold.2+0x5/0xa [ 41.199676] ? setup_fault_attr+0x220/0x220 [ 41.199685] ? __kernel_text_address+0xd/0x40 [ 41.199693] ? unwind_get_return_address+0x58/0xa0 [ 41.199703] __should_failslab+0xba/0xf0 [ 41.199712] should_failslab+0x9/0x20 [ 41.199717] __kmalloc+0x6f/0x3d0 [ 41.199723] ? gcmaes_encrypt.constprop.5+0x630/0xda0 [ 41.199731] gcmaes_encrypt.constprop.5+0x630/0xda0 [ 41.199737] ? kasan_kmalloc.part.1+0x62/0xf0 [ 41.199740] ? kasan_kmalloc+0xaf/0xc0 [ 41.199744] ? __kmalloc+0x15d/0x3d0 [ 41.199750] ? tls_push_record+0xff/0x15f0 [ 41.199754] ? tls_sw_sendmsg+0xb35/0x1010 [ 41.199762] ? gcmaes_crypt_by_sg.constprop.6+0x1430/0x1430 [ 41.199775] ? mark_held_locks+0x130/0x130 [ 41.199779] ? mark_held_locks+0xc7/0x130 [ 41.199788] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 41.199793] ? lockdep_hardirqs_on+0x3bb/0x5b0 [ 41.199798] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 41.199818] generic_gcmaes_encrypt+0xfd/0x150 [ 41.199823] ? generic_gcmaes_encrypt+0xfd/0x150 [ 41.199828] ? helper_rfc4106_encrypt+0x450/0x450 [ 41.199838] ? rcu_read_lock_sched_held+0x108/0x120 [ 41.199845] gcmaes_wrapper_encrypt+0x109/0x180 [ 41.199852] tls_push_record+0x9ae/0x15f0 [ 41.199867] tls_sw_sendmsg+0xb35/0x1010 [ 41.199884] ? tls_sw_push_pending_record+0x10/0x10 [ 41.199890] ? do_dup2+0x3f0/0x3f0 [ 41.199894] ? kasan_check_read+0x11/0x20 [ 41.199905] ? aa_sock_msg_perm.isra.2+0x88/0x130 [ 41.199914] inet_sendmsg+0x108/0x440 [ 41.199920] ? security_socket_sendmsg+0x4a/0x90 [ 41.199926] ? inet_recvmsg+0x580/0x580 [ 41.199932] sock_sendmsg+0xac/0xf0 [ 41.199939] __sys_sendto+0x1f2/0x2e0 [ 41.199944] ? __ia32_sys_getpeername+0xb0/0xb0 [ 41.199951] ? kernel_read+0x130/0x130 [ 41.199955] ? __f_unlock_pos+0xd/0x10 [ 41.199961] ? lock_downgrade+0x860/0x860 [ 41.199972] ? kasan_check_write+0x14/0x20 [ 41.199977] ? __mutex_unlock_slowpath+0xe8/0x6a0 [ 41.199990] ? __sb_end_write+0xa4/0xd0 [ 41.199996] ? kasan_check_write+0x14/0x20 [ 41.200001] ? fput+0x18/0x120 [ 41.200006] ? ksys_write+0x1ce/0x260 [ 41.200013] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 41.200019] ? do_syscall_64+0x21/0x4e0 [ 41.200026] __x64_sys_sendto+0xdc/0x1a0 [ 41.200034] do_syscall_64+0xd0/0x4e0 [ 41.200043] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 41.200048] RIP: 0033:0x4645a9 [ 41.200054] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 41.200057] RSP: 002b:00007fe6ff8b0198 EFLAGS: 00000246 ORIG_RAX: 000000000000002c [ 41.200063] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00000000004645a9 [ 41.200066] RDX: 00000000e0ffffff RSI: 00000000200005c0 RDI: 0000000000000003 [ 41.200069] RBP: 000000000051d8e0 R08: 0000000000000000 R09: 00000000000000d8 [ 41.200072] R10: 0000000000000000 R11: 0000000000000246 R12: 000000000055bf00 [ 41.200075] R13: 00007fe6ff8b06bc R14: 0000000000000005 R15: 0000000000000001 [ 41.302992] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 41.306048] FAULT_INJECTION: forcing a failure. [ 41.306048] name failslab, interval 1, probability 0, space 0, times 0 [ 41.306057] CPU: 1 PID: 7209 Comm: syz-executor.0 Not tainted 4.19.201-syzkaller #0 [ 41.306060] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 41.306063] Call Trace: [ 41.306074] dump_stack+0x17c/0x226 [ 41.306086] should_fail.cold.2+0x5/0xa [ 41.306095] ? setup_fault_attr+0x220/0x220 [ 41.306103] ? __kernel_text_address+0xd/0x40 [ 41.306110] ? unwind_get_return_address+0x58/0xa0 [ 41.306122] __should_failslab+0xba/0xf0 [ 41.306130] should_failslab+0x9/0x20 [ 41.306135] __kmalloc+0x6f/0x3d0 [ 41.306142] ? gcmaes_encrypt.constprop.5+0x630/0xda0 [ 41.306150] gcmaes_encrypt.constprop.5+0x630/0xda0 [ 41.306155] ? kasan_kmalloc.part.1+0x62/0xf0 [ 41.306159] ? kasan_kmalloc+0xaf/0xc0 [ 41.306163] ? __kmalloc+0x15d/0x3d0 [ 41.306170] ? tls_push_record+0xff/0x15f0 [ 41.306174] ? tls_sw_sendmsg+0xb35/0x1010 [ 41.306184] ? gcmaes_crypt_by_sg.constprop.6+0x1430/0x1430 [ 41.306199] ? mark_held_locks+0x130/0x130 [ 41.306204] ? mark_held_locks+0xc7/0x130 [ 41.306212] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 41.306218] ? lockdep_hardirqs_on+0x3bb/0x5b0 [ 41.306223] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 41.306236] generic_gcmaes_encrypt+0xfd/0x150 [ 41.306240] ? generic_gcmaes_encrypt+0xfd/0x150 [ 41.306246] ? helper_rfc4106_encrypt+0x450/0x450 [ 41.306255] ? rcu_read_lock_sched_held+0x108/0x120 [ 41.306263] gcmaes_wrapper_encrypt+0x109/0x180 [ 41.306270] tls_push_record+0x9ae/0x15f0 [ 41.306286] tls_sw_sendmsg+0xb35/0x1010 [ 41.306305] ? tls_sw_push_pending_record+0x10/0x10 [ 41.306312] ? do_dup2+0x3f0/0x3f0 [ 41.306319] ? kasan_check_read+0x11/0x20 [ 41.306330] ? aa_sock_msg_perm.isra.2+0x88/0x130 [ 41.306339] inet_sendmsg+0x108/0x440 [ 41.306345] ? security_socket_sendmsg+0x4a/0x90 [ 41.306351] ? inet_recvmsg+0x580/0x580 [ 41.306357] sock_sendmsg+0xac/0xf0 [ 41.306364] __sys_sendto+0x1f2/0x2e0 [ 41.306370] ? __ia32_sys_getpeername+0xb0/0xb0 [ 41.306377] ? kernel_read+0x130/0x130 [ 41.306382] ? __f_unlock_pos+0xd/0x10 [ 41.306387] ? lock_downgrade+0x860/0x860 [ 41.306398] ? kasan_check_write+0x14/0x20 [ 41.306404] ? __mutex_unlock_slowpath+0xe8/0x6a0 [ 41.306417] ? __sb_end_write+0xa4/0xd0 [ 41.306424] ? kasan_check_write+0x14/0x20 [ 41.306429] ? fput+0x18/0x120 [ 41.306434] ? ksys_write+0x1ce/0x260 [ 41.306442] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 41.306448] ? do_syscall_64+0x21/0x4e0 [ 41.306456] __x64_sys_sendto+0xdc/0x1a0 [ 41.306464] do_syscall_64+0xd0/0x4e0 [ 41.306473] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 41.306479] RIP: 0033:0x4645a9 [ 41.306484] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 41.306488] RSP: 002b:00007fe6ff8b0198 EFLAGS: 00000246 ORIG_RAX: 000000000000002c [ 41.306494] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00000000004645a9 [ 41.306497] RDX: 00000000e0ffffff RSI: 00000000200005c0 RDI: 0000000000000003 [ 41.306501] RBP: 000000000051d8e0 R08: 0000000000000000 R09: 00000000000000d8 [ 41.306504] R10: 0000000000000000 R11: 0000000000000246 R12: 000000000055bf00 [ 41.306507] R13: 00007fe6ff8b06bc R14: 0000000000000005 R15: 0000000000000001 [ 41.328202] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 41.330092] FAULT_INJECTION: forcing a failure. [ 41.330092] name failslab, interval 1, probability 0, space 0, times 0 [ 41.330101] CPU: 0 PID: 7212 Comm: syz-executor.2 Not tainted 4.19.201-syzkaller #0 [ 41.330104] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 41.330107] Call Trace: [ 41.330117] dump_stack+0x17c/0x226 [ 41.330130] should_fail.cold.2+0x5/0xa [ 41.330139] ? setup_fault_attr+0x220/0x220 [ 41.330153] __should_failslab+0xba/0xf0 [ 41.330161] should_failslab+0x9/0x20 [ 41.330165] __kmalloc+0x2b5/0x3d0 [ 41.330173] ? tls_push_record+0xff/0x15f0 [ 41.330181] tls_push_record+0xff/0x15f0 [ 41.330190] ? _copy_from_iter+0x17c/0xac0 [ 41.330203] tls_sw_sendmsg+0xb35/0x1010 [ 41.330222] ? tls_sw_push_pending_record+0x10/0x10 [ 41.330229] ? do_dup2+0x3f0/0x3f0 [ 41.330234] ? kasan_check_read+0x11/0x20 [ 41.330245] ? aa_sock_msg_perm.isra.2+0x88/0x130 [ 41.330255] inet_sendmsg+0x108/0x440 [ 41.330261] ? security_socket_sendmsg+0x4a/0x90 [ 41.330267] ? inet_recvmsg+0x580/0x580 [ 41.330274] sock_sendmsg+0xac/0xf0 [ 41.330281] __sys_sendto+0x1f2/0x2e0 [ 41.330287] ? __ia32_sys_getpeername+0xb0/0xb0 [ 41.330300] ? kernel_read+0x130/0x130 [ 41.330305] ? __f_unlock_pos+0xd/0x10 [ 41.330313] ? lock_downgrade+0x860/0x860 [ 41.330324] ? kasan_check_write+0x14/0x20 [ 41.330330] ? __mutex_unlock_slowpath+0xe8/0x6a0 [ 41.330344] ? __sb_end_write+0xa4/0xd0 [ 41.330351] ? kasan_check_write+0x14/0x20 [ 41.330356] ? fput+0x18/0x120 [ 41.330361] ? ksys_write+0x1ce/0x260 [ 41.330370] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 41.330376] ? do_syscall_64+0x21/0x4e0 [ 41.330384] __x64_sys_sendto+0xdc/0x1a0 [ 41.330393] do_syscall_64+0xd0/0x4e0 [ 41.330401] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 41.330406] RIP: 0033:0x4645a9 [ 41.330411] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 41.330415] RSP: 002b:00007ff7550a5198 EFLAGS: 00000246 ORIG_RAX: 000000000000002c [ 41.330422] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00000000004645a9 [ 41.330425] RDX: 00000000e0ffffff RSI: 00000000200005c0 RDI: 0000000000000003 [ 41.330428] RBP: 000000000051d8e0 R08: 0000000000000000 R09: 00000000000000d8 [ 41.330432] R10: 0000000000000000 R11: 0000000000000246 R12: 000000000055bf00 [ 41.330435] R13: 00007ff7550a56bc R14: 0000000000000005 R15: 0000000000000001 [ 41.424223] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 41.427855] FAULT_INJECTION: forcing a failure. [ 41.427855] name failslab, interval 1, probability 0, space 0, times 0 [ 41.427864] CPU: 1 PID: 7236 Comm: syz-executor.2 Not tainted 4.19.201-syzkaller #0 [ 41.427868] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 41.427870] Call Trace: [ 41.427881] dump_stack+0x17c/0x226 [ 41.427893] should_fail.cold.2+0x5/0xa [ 41.427901] ? setup_fault_attr+0x220/0x220 [ 41.427909] ? __kernel_text_address+0xd/0x40 [ 41.427916] ? unwind_get_return_address+0x58/0xa0 [ 41.427927] __should_failslab+0xba/0xf0 [ 41.427936] should_failslab+0x9/0x20 [ 41.427940] __kmalloc+0x6f/0x3d0 [ 41.427946] ? gcmaes_encrypt.constprop.5+0x630/0xda0 [ 41.427954] gcmaes_encrypt.constprop.5+0x630/0xda0 [ 41.427959] ? kasan_kmalloc.part.1+0x62/0xf0 [ 41.427963] ? kasan_kmalloc+0xaf/0xc0 [ 41.427967] ? __kmalloc+0x15d/0x3d0 [ 41.427973] ? tls_push_record+0xff/0x15f0 [ 41.427977] ? tls_sw_sendmsg+0xb35/0x1010 [ 41.427987] ? gcmaes_crypt_by_sg.constprop.6+0x1430/0x1430 [ 41.428001] ? mark_held_locks+0x130/0x130 [ 41.428005] ? mark_held_locks+0xc7/0x130 [ 41.428013] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 41.428019] ? lockdep_hardirqs_on+0x3bb/0x5b0 [ 41.428024] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 41.428035] generic_gcmaes_encrypt+0xfd/0x150 [ 41.428038] ? generic_gcmaes_encrypt+0xfd/0x150 [ 41.428043] ? helper_rfc4106_encrypt+0x450/0x450 [ 41.428050] ? rcu_read_lock_sched_held+0x108/0x120 [ 41.428057] gcmaes_wrapper_encrypt+0x109/0x180 [ 41.428063] tls_push_record+0x9ae/0x15f0 [ 41.428079] tls_sw_sendmsg+0xb35/0x1010 [ 41.428098] ? tls_sw_push_pending_record+0x10/0x10 [ 41.428105] ? do_dup2+0x3f0/0x3f0 [ 41.428109] ? kasan_check_read+0x11/0x20 [ 41.428119] ? aa_sock_msg_perm.isra.2+0x88/0x130 [ 41.428128] inet_sendmsg+0x108/0x440 [ 41.428133] ? security_socket_sendmsg+0x4a/0x90 [ 41.428139] ? inet_recvmsg+0x580/0x580 [ 41.428145] sock_sendmsg+0xac/0xf0 [ 41.428152] __sys_sendto+0x1f2/0x2e0 [ 41.428158] ? __ia32_sys_getpeername+0xb0/0xb0 [ 41.428165] ? kernel_read+0x130/0x130 [ 41.428170] ? __f_unlock_pos+0xd/0x10 [ 41.428175] ? lock_downgrade+0x860/0x860 [ 41.428187] ? kasan_check_write+0x14/0x20 [ 41.428192] ? __mutex_unlock_slowpath+0xe8/0x6a0 [ 41.428210] ? __sb_end_write+0xa4/0xd0 [ 41.428217] ? kasan_check_write+0x14/0x20 [ 41.428222] ? fput+0x18/0x120 [ 41.428227] ? ksys_write+0x1ce/0x260 [ 41.428235] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 41.428241] ? do_syscall_64+0x21/0x4e0 [ 41.428249] __x64_sys_sendto+0xdc/0x1a0 [ 41.428258] do_syscall_64+0xd0/0x4e0 [ 41.428266] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 41.428272] RIP: 0033:0x4645a9 [ 41.428277] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 41.428280] RSP: 002b:00007ff7550a5198 EFLAGS: 00000246 ORIG_RAX: 000000000000002c [ 41.428286] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00000000004645a9 [ 41.428289] RDX: 00000000e0ffffff RSI: 00000000200005c0 RDI: 0000000000000003 [ 41.428292] RBP: 000000000051d8e0 R08: 0000000000000000 R09: 00000000000000d8 [ 41.428295] R10: 0000000000000000 R11: 0000000000000246 R12: 000000000055bf00 [ 41.428298] R13: 00007ff7550a56bc R14: 0000000000000005 R15: 0000000000000001 [ 41.487530] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 41.490222] FAULT_INJECTION: forcing a failure. [ 41.490222] name failslab, interval 1, probability 0, space 0, times 0 [ 41.490231] CPU: 0 PID: 7248 Comm: syz-executor.1 Not tainted 4.19.201-syzkaller #0 [ 41.490234] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 41.490237] Call Trace: [ 41.490247] dump_stack+0x17c/0x226 [ 41.490259] should_fail.cold.2+0x5/0xa [ 41.490267] ? setup_fault_attr+0x220/0x220 [ 41.490275] ? __kernel_text_address+0xd/0x40 [ 41.490289] ? unwind_get_return_address+0x58/0xa0 [ 41.490298] __should_failslab+0xba/0xf0 [ 41.490305] should_failslab+0x9/0x20 [ 41.490310] __kmalloc+0x6f/0x3d0 [ 41.490316] ? gcmaes_encrypt.constprop.5+0x630/0xda0 [ 41.490323] gcmaes_encrypt.constprop.5+0x630/0xda0 [ 41.490327] ? kasan_kmalloc.part.1+0x62/0xf0 [ 41.490331] ? kasan_kmalloc+0xaf/0xc0 [ 41.490335] ? __kmalloc+0x15d/0x3d0 [ 41.490341] ? tls_push_record+0xff/0x15f0 [ 41.490345] ? tls_sw_sendmsg+0xb35/0x1010 [ 41.490353] ? gcmaes_crypt_by_sg.constprop.6+0x1430/0x1430 [ 41.490364] ? mark_held_locks+0x130/0x130 [ 41.490368] ? mark_held_locks+0xc7/0x130 [ 41.490378] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 41.490383] ? lockdep_hardirqs_on+0x3bb/0x5b0 [ 41.490388] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 41.490398] generic_gcmaes_encrypt+0xfd/0x150 [ 41.490403] ? generic_gcmaes_encrypt+0xfd/0x150 [ 41.490407] ? helper_rfc4106_encrypt+0x450/0x450 [ 41.490417] ? rcu_read_lock_sched_held+0x108/0x120 [ 41.490424] gcmaes_wrapper_encrypt+0x109/0x180 [ 41.490430] tls_push_record+0x9ae/0x15f0 [ 41.490444] tls_sw_sendmsg+0xb35/0x1010 [ 41.490459] ? tls_sw_push_pending_record+0x10/0x10 [ 41.490465] ? do_dup2+0x3f0/0x3f0 [ 41.490469] ? kasan_check_read+0x11/0x20 [ 41.490479] ? aa_sock_msg_perm.isra.2+0x88/0x130 [ 41.490488] inet_sendmsg+0x108/0x440 [ 41.490494] ? security_socket_sendmsg+0x4a/0x90 [ 41.490499] ? inet_recvmsg+0x580/0x580 [ 41.490505] sock_sendmsg+0xac/0xf0 [ 41.490511] __sys_sendto+0x1f2/0x2e0 [ 41.490517] ? __ia32_sys_getpeername+0xb0/0xb0 [ 41.490523] ? kernel_read+0x130/0x130 [ 41.490527] ? __f_unlock_pos+0xd/0x10 [ 41.490532] ? lock_downgrade+0x860/0x860 [ 41.490543] ? kasan_check_write+0x14/0x20 [ 41.490549] ? __mutex_unlock_slowpath+0xe8/0x6a0 [ 41.490561] ? __sb_end_write+0xa4/0xd0 [ 41.490567] ? kasan_check_write+0x14/0x20 [ 41.490571] ? fput+0x18/0x120 [ 41.490575] ? ksys_write+0x1ce/0x260 [ 41.490582] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 41.490587] ? do_syscall_64+0x21/0x4e0 [ 41.490595] __x64_sys_sendto+0xdc/0x1a0 [ 41.490603] do_syscall_64+0xd0/0x4e0 [ 41.490611] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 41.490616] RIP: 0033:0x4645a9 [ 41.490620] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 41.490623] RSP: 002b:00007fcd33544198 EFLAGS: 00000246 ORIG_RAX: 000000000000002c [ 41.490629] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00000000004645a9 [ 41.490632] RDX: 00000000e0ffffff RSI: 00000000200005c0 RDI: 0000000000000003 [ 41.490635] RBP: 000000000051d8e0 R08: 0000000000000000 R09: 00000000000000d8 [ 41.490638] R10: 0000000000000000 R11: 0000000000000246 R12: 000000000055bf00 [ 41.490641] R13: 00007fcd335446bc R14: 0000000000000005 R15: 0000000000000001 [ 41.518805] FAULT_INJECTION: forcing a failure. [ 41.518805] name failslab, interval 1, probability 0, space 0, times 0 [ 41.518814] CPU: 0 PID: 7250 Comm: syz-executor.4 Not tainted 4.19.201-syzkaller #0 [ 41.518818] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 41.518821] Call Trace: [ 41.518832] dump_stack+0x17c/0x226 [ 41.518844] should_fail.cold.2+0x5/0xa [ 41.518853] ? setup_fault_attr+0x220/0x220 [ 41.518861] ? __kernel_text_address+0xd/0x40 [ 41.518869] ? unwind_get_return_address+0x58/0xa0 [ 41.518879] __should_failslab+0xba/0xf0 [ 41.518888] should_failslab+0x9/0x20 [ 41.518892] __kmalloc+0x6f/0x3d0 [ 41.518899] ? gcmaes_encrypt.constprop.5+0x630/0xda0 [ 41.518906] gcmaes_encrypt.constprop.5+0x630/0xda0 [ 41.518912] ? kasan_kmalloc.part.1+0x62/0xf0 [ 41.518916] ? kasan_kmalloc+0xaf/0xc0 [ 41.518919] ? __kmalloc+0x15d/0x3d0 [ 41.518925] ? tls_push_record+0xff/0x15f0 [ 41.518930] ? tls_sw_sendmsg+0xb35/0x1010 [ 41.518940] ? gcmaes_crypt_by_sg.constprop.6+0x1430/0x1430 [ 41.518953] ? mark_held_locks+0x130/0x130 [ 41.518957] ? mark_held_locks+0xc7/0x130 [ 41.518965] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 41.518971] ? lockdep_hardirqs_on+0x3bb/0x5b0 [ 41.518976] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 41.518989] generic_gcmaes_encrypt+0xfd/0x150 [ 41.518993] ? generic_gcmaes_encrypt+0xfd/0x150 [ 41.518999] ? helper_rfc4106_encrypt+0x450/0x450 [ 41.519007] ? rcu_read_lock_sched_held+0x108/0x120 [ 41.519015] gcmaes_wrapper_encrypt+0x109/0x180 [ 41.519021] tls_push_record+0x9ae/0x15f0 [ 41.519037] tls_sw_sendmsg+0xb35/0x1010 [ 41.519056] ? tls_sw_push_pending_record+0x10/0x10 [ 41.519063] ? do_dup2+0x3f0/0x3f0 [ 41.519068] ? kasan_check_read+0x11/0x20 [ 41.519078] ? aa_sock_msg_perm.isra.2+0x88/0x130 [ 41.519087] inet_sendmsg+0x108/0x440 [ 41.519093] ? security_socket_sendmsg+0x4a/0x90 [ 41.519099] ? inet_recvmsg+0x580/0x580 [ 41.519105] sock_sendmsg+0xac/0xf0 [ 41.519112] __sys_sendto+0x1f2/0x2e0 [ 41.519118] ? __ia32_sys_getpeername+0xb0/0xb0 [ 41.519125] ? kernel_read+0x130/0x130 [ 41.519130] ? __f_unlock_pos+0xd/0x10 [ 41.519135] ? lock_downgrade+0x860/0x860 [ 41.519147] ? kasan_check_write+0x14/0x20 [ 41.519152] ? __mutex_unlock_slowpath+0xe8/0x6a0 [ 41.519165] ? __sb_end_write+0xa4/0xd0 [ 41.519172] ? kasan_check_write+0x14/0x20 [ 41.519177] ? fput+0x18/0x120 [ 41.519182] ? ksys_write+0x1ce/0x260 [ 41.519190] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 41.519196] ? do_syscall_64+0x21/0x4e0 [ 41.519204] __x64_sys_sendto+0xdc/0x1a0 [ 41.519211] do_syscall_64+0xd0/0x4e0 [ 41.519219] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 41.519225] RIP: 0033:0x4645a9 [ 41.519230] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 41.519232] RSP: 002b:00007f881e59a198 EFLAGS: 00000246 ORIG_RAX: 000000000000002c [ 41.519238] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00000000004645a9 [ 41.519241] RDX: 00000000e0ffffff RSI: 00000000200005c0 RDI: 0000000000000003 [ 41.519244] RBP: 000000000051d8e0 R08: 0000000000000000 R09: 00000000000000d8 [ 41.519247] R10: 0000000000000000 R11: 0000000000000246 R12: 000000000055bf00 [ 41.519250] R13: 00007f881e59a6bc R14: 0000000000000005 R15: 0000000000000001 [ 41.521836] FAULT_INJECTION: forcing a failure. [ 41.521836] name failslab, interval 1, probability 0, space 0, times 0 [ 41.521845] CPU: 0 PID: 7251 Comm: syz-executor.2 Not tainted 4.19.201-syzkaller #0 [ 41.521849] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 41.521852] Call Trace: [ 41.521862] dump_stack+0x17c/0x226 [ 41.521874] should_fail.cold.2+0x5/0xa [ 41.521883] ? setup_fault_attr+0x220/0x220 [ 41.521891] ? __kernel_text_address+0xd/0x40 [ 41.521898] ? unwind_get_return_address+0x58/0xa0 [ 41.521908] __should_failslab+0xba/0xf0 [ 41.521917] should_failslab+0x9/0x20 [ 41.521922] __kmalloc+0x6f/0x3d0 [ 41.521929] ? gcmaes_encrypt.constprop.5+0x630/0xda0 [ 41.521937] gcmaes_encrypt.constprop.5+0x630/0xda0 [ 41.521942] ? kasan_kmalloc.part.1+0x62/0xf0 [ 41.521946] ? kasan_kmalloc+0xaf/0xc0 [ 41.521951] ? __kmalloc+0x15d/0x3d0 [ 41.521958] ? tls_push_record+0xff/0x15f0 [ 41.521962] ? tls_sw_sendmsg+0xb35/0x1010 [ 41.521972] ? gcmaes_crypt_by_sg.constprop.6+0x1430/0x1430 [ 41.521986] ? mark_held_locks+0x130/0x130 [ 41.521991] ? mark_held_locks+0xc7/0x130 [ 41.521999] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 41.522006] ? lockdep_hardirqs_on+0x3bb/0x5b0 [ 41.522011] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 41.522023] generic_gcmaes_encrypt+0xfd/0x150 [ 41.522028] ? generic_gcmaes_encrypt+0xfd/0x150 [ 41.522033] ? helper_rfc4106_encrypt+0x450/0x450 [ 41.522042] ? rcu_read_lock_sched_held+0x108/0x120 [ 41.522050] gcmaes_wrapper_encrypt+0x109/0x180 [ 41.522057] tls_push_record+0x9ae/0x15f0 [ 41.522073] tls_sw_sendmsg+0xb35/0x1010 [ 41.522092] ? tls_sw_push_pending_record+0x10/0x10 [ 41.522100] ? do_dup2+0x3f0/0x3f0 [ 41.522104] ? kasan_check_read+0x11/0x20 [ 41.522114] ? aa_sock_msg_perm.isra.2+0x88/0x130 [ 41.522122] inet_sendmsg+0x108/0x440 [ 41.522128] ? security_socket_sendmsg+0x4a/0x90 [ 41.522134] ? inet_recvmsg+0x580/0x580 [ 41.522140] sock_sendmsg+0xac/0xf0 [ 41.522146] __sys_sendto+0x1f2/0x2e0 [ 41.522152] ? __ia32_sys_getpeername+0xb0/0xb0 [ 41.522159] ? kernel_read+0x130/0x130 [ 41.522164] ? __f_unlock_pos+0xd/0x10 [ 41.522170] ? lock_downgrade+0x860/0x860 [ 41.522181] ? kasan_check_write+0x14/0x20 [ 41.522186] ? __mutex_unlock_slowpath+0xe8/0x6a0 [ 41.522199] ? __sb_end_write+0xa4/0xd0 [ 41.522206] ? kasan_check_write+0x14/0x20 [ 41.522211] ? fput+0x18/0x120 [ 41.522216] ? ksys_write+0x1ce/0x260 [ 41.522224] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 41.522230] ? do_syscall_64+0x21/0x4e0 [ 41.522238] __x64_sys_sendto+0xdc/0x1a0 [ 41.522246] do_syscall_64+0xd0/0x4e0 [ 41.522255] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 41.522260] RIP: 0033:0x4645a9 [ 41.522265] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 41.522268] RSP: 002b:00007ff7550a5198 EFLAGS: 00000246 ORIG_RAX: 000000000000002c [ 41.522280] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00000000004645a9 [ 41.522284] RDX: 00000000e0ffffff RSI: 00000000200005c0 RDI: 0000000000000003 [ 41.522287] RBP: 000000000051d8e0 R08: 0000000000000000 R09: 00000000000000d8 [ 41.522290] R10: 0000000000000000 R11: 0000000000000246 R12: 000000000055bf00 [ 41.522293] R13: 00007ff7550a56bc R14: 0000000000000005 R15: 0000000000000001 [ 41.536103] FAULT_INJECTION: forcing a failure. [ 41.536103] name failslab, interval 1, probability 0, space 0, times 0 [ 41.536117] CPU: 0 PID: 7256 Comm: syz-executor.5 Not tainted 4.19.201-syzkaller #0 [ 41.536121] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 41.536123] Call Trace: [ 41.536148] dump_stack+0x17c/0x226 [ 41.536168] should_fail.cold.2+0x5/0xa [ 41.536190] ? setup_fault_attr+0x220/0x220 [ 41.536207] __should_failslab+0xba/0xf0 [ 41.536221] should_failslab+0x9/0x20 [ 41.536241] __kmalloc+0x2b5/0x3d0 [ 41.536250] ? tls_push_record+0xff/0x15f0 [ 41.536267] tls_push_record+0xff/0x15f0 [ 41.536276] ? _copy_from_iter+0x17c/0xac0 [ 41.536296] tls_sw_sendmsg+0xb35/0x1010 [ 41.536318] ? tls_sw_push_pending_record+0x10/0x10 [ 41.536333] ? do_dup2+0x3f0/0x3f0 [ 41.536336] ? kasan_check_read+0x11/0x20 [ 41.536346] ? aa_sock_msg_perm.isra.2+0x88/0x130 [ 41.536362] inet_sendmsg+0x108/0x440 [ 41.536368] ? security_socket_sendmsg+0x4a/0x90 [ 41.536373] ? inet_recvmsg+0x580/0x580 [ 41.536378] sock_sendmsg+0xac/0xf0 [ 41.536385] __sys_sendto+0x1f2/0x2e0 [ 41.536389] ? __ia32_sys_getpeername+0xb0/0xb0 [ 41.536394] ? kernel_read+0x130/0x130 [ 41.536402] ? __f_unlock_pos+0xd/0x10 [ 41.536411] ? lock_downgrade+0x860/0x860 [ 41.536421] ? kasan_check_write+0x14/0x20 [ 41.536426] ? __mutex_unlock_slowpath+0xe8/0x6a0 [ 41.536439] ? __sb_end_write+0xa4/0xd0 [ 41.536449] ? kasan_check_write+0x14/0x20 [ 41.536454] ? fput+0x18/0x120 [ 41.536459] ? ksys_write+0x1ce/0x260 [ 41.536475] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 41.536479] ? do_syscall_64+0x21/0x4e0 [ 41.536487] __x64_sys_sendto+0xdc/0x1a0 [ 41.536499] do_syscall_64+0xd0/0x4e0 [ 41.536508] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 41.536514] RIP: 0033:0x4645a9 [ 41.536523] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 41.536526] RSP: 002b:00007f29d197c198 EFLAGS: 00000246 ORIG_RAX: 000000000000002c [ 41.536532] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00000000004645a9 [ 41.536535] RDX: 00000000e0ffffff RSI: 00000000200005c0 RDI: 0000000000000003 [ 41.536539] RBP: 000000000051d8e0 R08: 0000000000000000 R09: 00000000000000d8 [ 41.536542] R10: 0000000000000000 R11: 0000000000000246 R12: 000000000055bf00 [ 41.536550] R13: 00007f29d197c6bc R14: 0000000000000005 R15: 0000000000000001 [ 41.537373] FAULT_INJECTION: forcing a failure. [ 41.537373] name failslab, interval 1, probability 0, space 0, times 0 [ 41.537381] CPU: 1 PID: 7255 Comm: syz-executor.3 Not tainted 4.19.201-syzkaller #0 [ 41.537384] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 41.537387] Call Trace: [ 41.537395] dump_stack+0x17c/0x226 [ 41.537406] should_fail.cold.2+0x5/0xa [ 41.537414] ? setup_fault_attr+0x220/0x220 [ 41.537422] ? __kernel_text_address+0xd/0x40 [ 41.537429] ? unwind_get_return_address+0x58/0xa0 [ 41.537439] __should_failslab+0xba/0xf0 [ 41.537446] should_failslab+0x9/0x20 [ 41.537450] __kmalloc+0x6f/0x3d0 [ 41.537457] ? gcmaes_encrypt.constprop.5+0x630/0xda0 [ 41.537465] gcmaes_encrypt.constprop.5+0x630/0xda0 [ 41.537469] ? kasan_kmalloc.part.1+0x62/0xf0 [ 41.537473] ? kasan_kmalloc+0xaf/0xc0 [ 41.537477] ? __kmalloc+0x15d/0x3d0 [ 41.537482] ? tls_push_record+0xff/0x15f0 [ 41.537487] ? tls_sw_sendmsg+0xb35/0x1010 [ 41.537495] ? gcmaes_crypt_by_sg.constprop.6+0x1430/0x1430 [ 41.537509] ? mark_held_locks+0x130/0x130 [ 41.537514] ? mark_held_locks+0xc7/0x130 [ 41.537521] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 41.537527] ? lockdep_hardirqs_on+0x3bb/0x5b0 [ 41.537532] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 41.537542] generic_gcmaes_encrypt+0xfd/0x150 [ 41.537547] ? generic_gcmaes_encrypt+0xfd/0x150 [ 41.537552] ? helper_rfc4106_encrypt+0x450/0x450 [ 41.537561] ? rcu_read_lock_sched_held+0x108/0x120 [ 41.537567] gcmaes_wrapper_encrypt+0x109/0x180 [ 41.537573] tls_push_record+0x9ae/0x15f0 [ 41.537588] tls_sw_sendmsg+0xb35/0x1010 [ 41.537606] ? tls_sw_push_pending_record+0x10/0x10 [ 41.537612] ? do_dup2+0x3f0/0x3f0 [ 41.537616] ? kasan_check_read+0x11/0x20 [ 41.537627] ? aa_sock_msg_perm.isra.2+0x88/0x130 [ 41.537635] inet_sendmsg+0x108/0x440 [ 41.537641] ? security_socket_sendmsg+0x4a/0x90 [ 41.537646] ? inet_recvmsg+0x580/0x580 [ 41.537652] sock_sendmsg+0xac/0xf0 [ 41.537659] __sys_sendto+0x1f2/0x2e0 [ 41.537664] ? __ia32_sys_getpeername+0xb0/0xb0 [ 41.537670] ? kernel_read+0x130/0x130 [ 41.537674] ? __f_unlock_pos+0xd/0x10 [ 41.537679] ? lock_downgrade+0x860/0x860 [ 41.537688] ? kasan_check_write+0x14/0x20 [ 41.537693] ? __mutex_unlock_slowpath+0xe8/0x6a0 [ 41.537705] ? __sb_end_write+0xa4/0xd0 [ 41.537718] ? kasan_check_write+0x14/0x20 [ 41.537723] ? fput+0x18/0x120 [ 41.537728] ? ksys_write+0x1ce/0x260 [ 41.537734] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 41.537740] ? do_syscall_64+0x21/0x4e0 [ 41.537748] __x64_sys_sendto+0xdc/0x1a0 [ 41.537756] do_syscall_64+0xd0/0x4e0 [ 41.537764] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 41.537769] RIP: 0033:0x4645a9 [ 41.537774] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 41.537778] RSP: 002b:00007f8052add198 EFLAGS: 00000246 ORIG_RAX: 000000000000002c [ 41.537783] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00000000004645a9 [ 41.537786] RDX: 00000000e0ffffff RSI: 00000000200005c0 RDI: 0000000000000003 [ 41.537789] RBP: 000000000051d8e0 R08: 0000000000000000 R09: 00000000000000d8 [ 41.537792] R10: 0000000000000000 R11: 0000000000000246 R12: 000000000055bf00 [ 41.537794] R13: 00007f8052add6bc R14: 0000000000000005 R15: 0000000000000001 [ 41.684946] FAULT_INJECTION: forcing a failure. [ 41.684946] name failslab, interval 1, probability 0, space 0, times 0 [ 41.684955] CPU: 1 PID: 7270 Comm: syz-executor.0 Not tainted 4.19.201-syzkaller #0 [ 41.684958] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 41.684961] Call Trace: [ 41.684972] dump_stack+0x17c/0x226 [ 41.684984] should_fail.cold.2+0x5/0xa [ 41.684993] ? setup_fault_attr+0x220/0x220 [ 41.685001] ? __kernel_text_address+0xd/0x40 [ 41.685009] ? unwind_get_return_address+0x58/0xa0 [ 41.685019] __should_failslab+0xba/0xf0 [ 41.685027] should_failslab+0x9/0x20 [ 41.685032] __kmalloc+0x6f/0x3d0 [ 41.685039] ? gcmaes_encrypt.constprop.5+0x630/0xda0 [ 41.685046] gcmaes_encrypt.constprop.5+0x630/0xda0 [ 41.685051] ? kasan_kmalloc.part.1+0x62/0xf0 [ 41.685055] ? kasan_kmalloc+0xaf/0xc0 [ 41.685058] ? __kmalloc+0x15d/0x3d0 [ 41.685065] ? tls_push_record+0xff/0x15f0 [ 41.685069] ? tls_sw_sendmsg+0xb35/0x1010 [ 41.685079] ? gcmaes_crypt_by_sg.constprop.6+0x1430/0x1430 [ 41.685093] ? mark_held_locks+0x130/0x130 [ 41.685097] ? mark_held_locks+0xc7/0x130 [ 41.685106] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 41.685111] ? lockdep_hardirqs_on+0x3bb/0x5b0 [ 41.685116] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 41.685127] generic_gcmaes_encrypt+0xfd/0x150 [ 41.685132] ? generic_gcmaes_encrypt+0xfd/0x150 [ 41.685138] ? helper_rfc4106_encrypt+0x450/0x450 [ 41.685147] ? rcu_read_lock_sched_held+0x108/0x120 [ 41.685155] gcmaes_wrapper_encrypt+0x109/0x180 [ 41.685171] tls_push_record+0x9ae/0x15f0 [ 41.685187] tls_sw_sendmsg+0xb35/0x1010 [ 41.685206] ? tls_sw_push_pending_record+0x10/0x10 [ 41.685214] ? do_dup2+0x3f0/0x3f0 [ 41.685218] ? kasan_check_read+0x11/0x20 [ 41.685229] ? aa_sock_msg_perm.isra.2+0x88/0x130 [ 41.685239] inet_sendmsg+0x108/0x440 [ 41.685245] ? security_socket_sendmsg+0x4a/0x90 [ 41.685251] ? inet_recvmsg+0x580/0x580 [ 41.685257] sock_sendmsg+0xac/0xf0 [ 41.685265] __sys_sendto+0x1f2/0x2e0 [ 41.685271] ? __ia32_sys_getpeername+0xb0/0xb0 [ 41.685278] ? kernel_read+0x130/0x130 [ 41.685283] ? __f_unlock_pos+0xd/0x10 [ 41.685289] ? lock_downgrade+0x860/0x860 [ 41.685299] ? kasan_check_write+0x14/0x20 [ 41.685306] ? __mutex_unlock_slowpath+0xe8/0x6a0 [ 41.685318] ? __sb_end_write+0xa4/0xd0 [ 41.685325] ? kasan_check_write+0x14/0x20 [ 41.685330] ? fput+0x18/0x120 [ 41.685336] ? ksys_write+0x1ce/0x260 [ 41.685343] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 41.685349] ? do_syscall_64+0x21/0x4e0 [ 41.685357] __x64_sys_sendto+0xdc/0x1a0 [ 41.685365] do_syscall_64+0xd0/0x4e0 [ 41.685374] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 41.685379] RIP: 0033:0x4645a9 [ 41.685384] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 41.685388] RSP: 002b:00007fe6ff8b0198 EFLAGS: 00000246 ORIG_RAX: 000000000000002c [ 41.685394] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00000000004645a9 [ 41.685398] RDX: 00000000e0ffffff RSI: 00000000200005c0 RDI: 0000000000000003 [ 41.685401] RBP: 000000000051d8e0 R08: 0000000000000000 R09: 00000000000000d8 [ 41.685404] R10: 0000000000000000 R11: 0000000000000246 R12: 000000000055bf00 [ 41.685408] R13: 00007fe6ff8b06bc R14: 0000000000000005 R15: 0000000000000001 [ 41.687126] FAULT_INJECTION: forcing a failure. [ 41.687126] name failslab, interval 1, probability 0, space 0, times 0 [ 41.687133] CPU: 1 PID: 7273 Comm: syz-executor.4 Not tainted 4.19.201-syzkaller #0 [ 41.687137] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 41.687139] Call Trace: [ 41.687149] dump_stack+0x17c/0x226 [ 41.687168] should_fail.cold.2+0x5/0xa [ 41.687176] ? setup_fault_attr+0x220/0x220 [ 41.687185] ? __kernel_text_address+0xd/0x40 [ 41.687193] ? unwind_get_return_address+0x58/0xa0 [ 41.687203] __should_failslab+0xba/0xf0 [ 41.687210] should_failslab+0x9/0x20 [ 41.687214] __kmalloc+0x6f/0x3d0 [ 41.687220] ? gcmaes_encrypt.constprop.5+0x630/0xda0 [ 41.687227] gcmaes_encrypt.constprop.5+0x630/0xda0 [ 41.687232] ? kasan_kmalloc.part.1+0x62/0xf0 [ 41.687236] ? kasan_kmalloc+0xaf/0xc0 [ 41.687240] ? __kmalloc+0x15d/0x3d0 [ 41.687246] ? tls_push_record+0xff/0x15f0 [ 41.687250] ? tls_sw_sendmsg+0xb35/0x1010 [ 41.687259] ? gcmaes_crypt_by_sg.constprop.6+0x1430/0x1430 [ 41.687273] ? mark_held_locks+0x130/0x130 [ 41.687277] ? mark_held_locks+0xc7/0x130 [ 41.687284] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 41.687290] ? lockdep_hardirqs_on+0x3bb/0x5b0 [ 41.687295] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 41.687307] generic_gcmaes_encrypt+0xfd/0x150 [ 41.687311] ? generic_gcmaes_encrypt+0xfd/0x150 [ 41.687316] ? helper_rfc4106_encrypt+0x450/0x450 [ 41.687324] ? rcu_read_lock_sched_held+0x108/0x120 [ 41.687332] gcmaes_wrapper_encrypt+0x109/0x180 [ 41.687339] tls_push_record+0x9ae/0x15f0 [ 41.687354] tls_sw_sendmsg+0xb35/0x1010 [ 41.687371] ? tls_sw_push_pending_record+0x10/0x10 [ 41.687380] ? do_dup2+0x3f0/0x3f0 [ 41.687387] ? kasan_check_read+0x11/0x20 [ 41.687400] ? aa_sock_msg_perm.isra.2+0x88/0x130 [ 41.687409] inet_sendmsg+0x108/0x440 [ 41.687415] ? security_socket_sendmsg+0x4a/0x90 [ 41.687420] ? inet_recvmsg+0x580/0x580 [ 41.687426] sock_sendmsg+0xac/0xf0 [ 41.687433] __sys_sendto+0x1f2/0x2e0 [ 41.687439] ? __ia32_sys_getpeername+0xb0/0xb0 [ 41.687445] ? kernel_read+0x130/0x130 [ 41.687450] ? __f_unlock_pos+0xd/0x10 [ 41.687455] ? lock_downgrade+0x860/0x860 [ 41.687465] ? kasan_check_write+0x14/0x20 [ 41.687471] ? __mutex_unlock_slowpath+0xe8/0x6a0 [ 41.687483] ? __sb_end_write+0xa4/0xd0 [ 41.687489] ? kasan_check_write+0x14/0x20 [ 41.687494] ? fput+0x18/0x120 [ 41.687499] ? ksys_write+0x1ce/0x260 [ 41.687506] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 41.687511] ? do_syscall_64+0x21/0x4e0 [ 41.687519] __x64_sys_sendto+0xdc/0x1a0 [ 41.687527] do_syscall_64+0xd0/0x4e0 [ 41.687536] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 41.687540] RIP: 0033:0x4645a9 [ 41.687545] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 41.687548] RSP: 002b:00007f881e59a198 EFLAGS: 00000246 ORIG_RAX: 000000000000002c [ 41.687553] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00000000004645a9 [ 41.687556] RDX: 00000000e0ffffff RSI: 00000000200005c0 RDI: 0000000000000003 [ 41.687560] RBP: 000000000051d8e0 R08: 0000000000000000 R09: 00000000000000d8 [ 41.687563] R10: 0000000000000000 R11: 0000000000000246 R12: 000000000055bf00 [ 41.687566] R13: 00007f881e59a6bc R14: 0000000000000005 R15: 0000000000000001 [ 41.687883] FAULT_INJECTION: forcing a failure. [ 41.687883] name failslab, interval 1, probability 0, space 0, times 0 [ 41.687890] CPU: 0 PID: 7274 Comm: syz-executor.3 Not tainted 4.19.201-syzkaller #0 [ 41.687893] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 41.687896] Call Trace: [ 41.687903] dump_stack+0x17c/0x226 [ 41.687913] should_fail.cold.2+0x5/0xa [ 41.687921] ? setup_fault_attr+0x220/0x220 [ 41.687927] ? __kernel_text_address+0xd/0x40 [ 41.687934] ? unwind_get_return_address+0x58/0xa0 [ 41.687943] __should_failslab+0xba/0xf0 [ 41.687949] should_failslab+0x9/0x20 [ 41.687953] FAULT_INJECTION: forcing a failure. [ 41.687953] name failslab, interval 1, probability 0, space 0, times 0 [ 41.687955] __kmalloc+0x6f/0x3d0 [ 41.687960] ? gcmaes_encrypt.constprop.5+0x630/0xda0 [ 41.687967] gcmaes_encrypt.constprop.5+0x630/0xda0 [ 41.687971] ? kasan_kmalloc.part.1+0x62/0xf0 [ 41.687975] ? kasan_kmalloc+0xaf/0xc0 [ 41.687978] ? __kmalloc+0x15d/0x3d0 [ 41.687982] ? tls_push_record+0xff/0x15f0 [ 41.687986] ? tls_sw_sendmsg+0xb35/0x1010 [ 41.687994] ? gcmaes_crypt_by_sg.constprop.6+0x1430/0x1430 [ 41.688008] ? mark_held_locks+0x130/0x130 [ 41.688012] ? mark_held_locks+0xc7/0x130 [ 41.688017] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 41.688022] ? lockdep_hardirqs_on+0x3bb/0x5b0 [ 41.688027] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 41.688037] generic_gcmaes_encrypt+0xfd/0x150 [ 41.688040] ? generic_gcmaes_encrypt+0xfd/0x150 [ 41.688045] ? helper_rfc4106_encrypt+0x450/0x450 [ 41.688052] ? rcu_read_lock_sched_held+0x108/0x120 [ 41.688058] gcmaes_wrapper_encrypt+0x109/0x180 [ 41.688064] tls_push_record+0x9ae/0x15f0 [ 41.688078] tls_sw_sendmsg+0xb35/0x1010 [ 41.688094] ? tls_sw_push_pending_record+0x10/0x10 [ 41.688099] ? do_dup2+0x3f0/0x3f0 [ 41.688103] ? kasan_check_read+0x11/0x20 [ 41.688111] ? aa_sock_msg_perm.isra.2+0x88/0x130 [ 41.688118] inet_sendmsg+0x108/0x440 [ 41.688123] ? security_socket_sendmsg+0x4a/0x90 [ 41.688128] ? inet_recvmsg+0x580/0x580 [ 41.688132] sock_sendmsg+0xac/0xf0 [ 41.688138] __sys_sendto+0x1f2/0x2e0 [ 41.688143] ? __ia32_sys_getpeername+0xb0/0xb0 [ 41.688148] ? kernel_read+0x130/0x130 [ 41.688151] ? __f_unlock_pos+0xd/0x10 [ 41.688156] ? lock_downgrade+0x860/0x860 [ 41.688165] ? kasan_check_write+0x14/0x20 [ 41.688170] ? __mutex_unlock_slowpath+0xe8/0x6a0 [ 41.688180] ? __sb_end_write+0xa4/0xd0 [ 41.688186] ? kasan_check_write+0x14/0x20 [ 41.688190] ? fput+0x18/0x120 [ 41.688195] ? ksys_write+0x1ce/0x260 [ 41.688201] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 41.688206] ? do_syscall_64+0x21/0x4e0 [ 41.688213] __x64_sys_sendto+0xdc/0x1a0 [ 41.688220] do_syscall_64+0xd0/0x4e0 [ 41.688227] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 41.688231] RIP: 0033:0x4645a9 [ 41.688235] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 41.688238] RSP: 002b:00007f8052add198 EFLAGS: 00000246 ORIG_RAX: 000000000000002c [ 41.688242] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00000000004645a9 [ 41.688245] RDX: 00000000e0ffffff RSI: 00000000200005c0 RDI: 0000000000000003 [ 41.688248] RBP: 000000000051d8e0 R08: 0000000000000000 R09: 00000000000000d8 [ 41.688251] R10: 0000000000000000 R11: 0000000000000246 R12: 000000000055bf00 [ 41.688253] R13: 00007f8052add6bc R14: 0000000000000005 R15: 0000000000000001 [ 41.688267] CPU: 1 PID: 7271 Comm: syz-executor.5 Not tainted 4.19.201-syzkaller #0 [ 41.688270] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 41.688272] Call Trace: [ 41.688278] dump_stack+0x17c/0x226 [ 41.688291] should_fail.cold.2+0x5/0xa [ 41.688298] ? setup_fault_attr+0x220/0x220 [ 41.688304] ? __kernel_text_address+0xd/0x40 [ 41.688309] ? unwind_get_return_address+0x58/0xa0 [ 41.688317] __should_failslab+0xba/0xf0 [ 41.688323] should_failslab+0x9/0x20 [ 41.688327] __kmalloc+0x6f/0x3d0 [ 41.688332] ? gcmaes_encrypt.constprop.5+0x630/0xda0 [ 41.688340] gcmaes_encrypt.constprop.5+0x630/0xda0 [ 41.688345] ? kasan_kmalloc.part.1+0x62/0xf0 [ 41.688349] ? kasan_kmalloc+0xaf/0xc0 [ 41.688353] ? __kmalloc+0x15d/0x3d0 [ 41.688358] ? tls_push_record+0xff/0x15f0 [ 41.688362] ? tls_sw_sendmsg+0xb35/0x1010 [ 41.688371] ? gcmaes_crypt_by_sg.constprop.6+0x1430/0x1430 [ 41.688383] ? mark_held_locks+0x130/0x130 [ 41.688387] ? mark_held_locks+0xc7/0x130 [ 41.688393] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 41.688398] ? lockdep_hardirqs_on+0x3bb/0x5b0 [ 41.688403] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 41.688415] generic_gcmaes_encrypt+0xfd/0x150 [ 41.688419] ? generic_gcmaes_encrypt+0xfd/0x150 [ 41.688424] ? helper_rfc4106_encrypt+0x450/0x450 [ 41.688432] ? rcu_read_lock_sched_held+0x108/0x120 [ 41.688439] gcmaes_wrapper_encrypt+0x109/0x180 [ 41.688446] tls_push_record+0x9ae/0x15f0 [ 41.688461] tls_sw_sendmsg+0xb35/0x1010 [ 41.688481] ? tls_sw_push_pending_record+0x10/0x10 [ 41.688487] ? do_dup2+0x3f0/0x3f0 [ 41.688492] ? kasan_check_read+0x11/0x20 [ 41.688501] ? aa_sock_msg_perm.isra.2+0x88/0x130 [ 41.688508] inet_sendmsg+0x108/0x440 [ 41.688513] ? security_socket_sendmsg+0x4a/0x90 [ 41.688518] ? inet_recvmsg+0x580/0x580 [ 41.688523] sock_sendmsg+0xac/0xf0 [ 41.688529] __sys_sendto+0x1f2/0x2e0 [ 41.688535] ? __ia32_sys_getpeername+0xb0/0xb0 [ 41.688540] ? kernel_read+0x130/0x130 [ 41.688544] ? __f_unlock_pos+0xd/0x10 [ 41.688550] ? lock_downgrade+0x860/0x860 [ 41.688560] ? kasan_check_write+0x14/0x20 [ 41.688565] ? __mutex_unlock_slowpath+0xe8/0x6a0 [ 41.688577] ? __sb_end_write+0xa4/0xd0 [ 41.688583] ? kasan_check_write+0x14/0x20 [ 41.688588] ? fput+0x18/0x120 [ 41.688593] ? ksys_write+0x1ce/0x260 [ 41.688600] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 41.688606] ? do_syscall_64+0x21/0x4e0 [ 41.688615] __x64_sys_sendto+0xdc/0x1a0 [ 41.688623] do_syscall_64+0xd0/0x4e0 [ 41.688631] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 41.688635] RIP: 0033:0x4645a9 [ 41.688640] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 41.688643] RSP: 002b:00007f29d197c198 EFLAGS: 00000246 ORIG_RAX: 000000000000002c [ 41.688648] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00000000004645a9 [ 41.688651] RDX: 00000000e0ffffff RSI: 00000000200005c0 RDI: 0000000000000003 [ 41.688655] RBP: 000000000051d8e0 R08: 0000000000000000 R09: 00000000000000d8 [ 41.688657] R10: 0000000000000000 R11: 0000000000000246 R12: 000000000055bf00 [ 41.688660] R13: 00007f29d197c6bc R14: 0000000000000005 R15: 0000000000000001 [ 41.688785] FAULT_INJECTION: forcing a failure. [ 41.688785] name failslab, interval 1, probability 0, space 0, times 0 [ 41.688790] CPU: 0 PID: 7272 Comm: syz-executor.1 Not tainted 4.19.201-syzkaller #0 [ 41.688793] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 41.688795] Call Trace: [ 41.688801] dump_stack+0x17c/0x226 [ 41.688810] should_fail.cold.2+0x5/0xa [ 41.688818] ? setup_fault_attr+0x220/0x220 [ 41.688824] ? __kernel_text_address+0xd/0x40 [ 41.688830] ? unwind_get_return_address+0x58/0xa0 [ 41.688840] __should_failslab+0xba/0xf0 [ 41.688846] should_failslab+0x9/0x20 [ 41.688850] __kmalloc+0x6f/0x3d0 [ 41.688856] ? gcmaes_encrypt.constprop.5+0x630/0xda0 [ 41.688864] gcmaes_encrypt.constprop.5+0x630/0xda0 [ 41.688869] ? kasan_kmalloc.part.1+0x62/0xf0 [ 41.688872] ? kasan_kmalloc+0xaf/0xc0 [ 41.688876] ? __kmalloc+0x15d/0x3d0 [ 41.688880] ? tls_push_record+0xff/0x15f0 [ 41.688884] ? tls_sw_sendmsg+0xb35/0x1010 [ 41.688894] ? gcmaes_crypt_by_sg.constprop.6+0x1430/0x1430 [ 41.688906] ? mark_held_locks+0x130/0x130 [ 41.688910] ? mark_held_locks+0xc7/0x130 [ 41.688916] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 41.688922] ? lockdep_hardirqs_on+0x3bb/0x5b0 [ 41.688927] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 41.688938] generic_gcmaes_encrypt+0xfd/0x150 [ 41.688943] ? generic_gcmaes_encrypt+0xfd/0x150 [ 41.688948] ? helper_rfc4106_encrypt+0x450/0x450 [ 41.688956] ? rcu_read_lock_sched_held+0x108/0x120 [ 41.688961] gcmaes_wrapper_encrypt+0x109/0x180 [ 41.688967] tls_push_record+0x9ae/0x15f0 [ 41.688980] tls_sw_sendmsg+0xb35/0x1010 [ 41.688997] ? tls_sw_push_pending_record+0x10/0x10 [ 41.689004] ? do_dup2+0x3f0/0x3f0 [ 41.689007] ? kasan_check_read+0x11/0x20 [ 41.689016] ? aa_sock_msg_perm.isra.2+0x88/0x130 [ 41.689024] inet_sendmsg+0x108/0x440 [ 41.689028] ? security_socket_sendmsg+0x4a/0x90 [ 41.689034] ? inet_recvmsg+0x580/0x580 [ 41.689038] sock_sendmsg+0xac/0xf0 [ 41.689045] __sys_sendto+0x1f2/0x2e0 [ 41.689051] ? __ia32_sys_getpeername+0xb0/0xb0 [ 41.689056] ? kernel_read+0x130/0x130 [ 41.689060] ? __f_unlock_pos+0xd/0x10 [ 41.689066] ? lock_downgrade+0x860/0x860 [ 41.689077] ? kasan_check_write+0x14/0x20 [ 41.689082] ? __mutex_unlock_slowpath+0xe8/0x6a0 [ 41.689094] ? __sb_end_write+0xa4/0xd0 [ 41.689101] ? kasan_check_write+0x14/0x20 [ 41.689105] ? fput+0x18/0x120 [ 41.689111] ? ksys_write+0x1ce/0x260 [ 41.689118] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 41.689124] ? do_syscall_64+0x21/0x4e0 [ 41.689132] __x64_sys_sendto+0xdc/0x1a0 [ 41.689141] do_syscall_64+0xd0/0x4e0 [ 41.689149] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 41.689153] RIP: 0033:0x4645a9 [ 41.689158] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 41.689160] RSP: 002b:00007fcd33544198 EFLAGS: 00000246 ORIG_RAX: 000000000000002c [ 41.689165] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00000000004645a9 [ 41.689168] RDX: 00000000e0ffffff RSI: 00000000200005c0 RDI: 0000000000000003 [ 41.689171] RBP: 000000000051d8e0 R08: 0000000000000000 R09: 00000000000000d8 [ 41.689174] R10: 0000000000000000 R11: 0000000000000246 R12: 000000000055bf00 [ 41.689177] R13: 00007fcd335446bc R14: 0000000000000005 R15: 0000000000000001 [ 41.690302] FAULT_INJECTION: forcing a failure. [ 41.690302] name failslab, interval 1, probability 0, space 0, times 0 [ 41.690309] CPU: 0 PID: 7275 Comm: syz-executor.2 Not tainted 4.19.201-syzkaller #0 [ 41.690312] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 41.690315] Call Trace: [ 41.690323] dump_stack+0x17c/0x226 [ 41.690334] should_fail.cold.2+0x5/0xa [ 41.690342] ? setup_fault_attr+0x220/0x220 [ 41.690349] ? __kernel_text_address+0xd/0x40 [ 41.690356] ? unwind_get_return_address+0x58/0xa0 [ 41.690366] __should_failslab+0xba/0xf0 [ 41.690374] should_failslab+0x9/0x20 [ 41.690379] __kmalloc+0x6f/0x3d0 [ 41.690385] ? gcmaes_encrypt.constprop.5+0x630/0xda0 [ 41.690392] gcmaes_encrypt.constprop.5+0x630/0xda0 [ 41.690398] ? kasan_kmalloc.part.1+0x62/0xf0 [ 41.690402] ? kasan_kmalloc+0xaf/0xc0 [ 41.690406] ? __kmalloc+0x15d/0x3d0 [ 41.690411] ? tls_push_record+0xff/0x15f0 [ 41.690415] ? tls_sw_sendmsg+0xb35/0x1010 [ 41.690425] ? gcmaes_crypt_by_sg.constprop.6+0x1430/0x1430 [ 41.690438] ? mark_held_locks+0x130/0x130 [ 41.690442] ? mark_held_locks+0xc7/0x130 [ 41.690451] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 41.690456] ? lockdep_hardirqs_on+0x3bb/0x5b0 [ 41.690462] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 41.690474] generic_gcmaes_encrypt+0xfd/0x150 [ 41.690478] ? generic_gcmaes_encrypt+0xfd/0x150 [ 41.690483] ? helper_rfc4106_encrypt+0x450/0x450 [ 41.690496] ? rcu_read_lock_sched_held+0x108/0x120 [ 41.690503] gcmaes_wrapper_encrypt+0x109/0x180 [ 41.690510] tls_push_record+0x9ae/0x15f0 [ 41.690526] tls_sw_sendmsg+0xb35/0x1010 [ 41.690546] ? tls_sw_push_pending_record+0x10/0x10 [ 41.690553] ? do_dup2+0x3f0/0x3f0 [ 41.690559] ? kasan_check_read+0x11/0x20 [ 41.690569] ? aa_sock_msg_perm.isra.2+0x88/0x130 [ 41.690579] inet_sendmsg+0x108/0x440 [ 41.690585] ? security_socket_sendmsg+0x4a/0x90 [ 41.690590] ? inet_recvmsg+0x580/0x580 [ 41.690596] sock_sendmsg+0xac/0xf0 [ 41.690603] __sys_sendto+0x1f2/0x2e0 [ 41.690609] ? __ia32_sys_getpeername+0xb0/0xb0 [ 41.690616] ? kernel_read+0x130/0x130 [ 41.690620] ? __f_unlock_pos+0xd/0x10 [ 41.690625] ? lock_downgrade+0x860/0x860 [ 41.690636] ? kasan_check_write+0x14/0x20 [ 41.690641] ? __mutex_unlock_slowpath+0xe8/0x6a0 [ 41.690653] ? __sb_end_write+0xa4/0xd0 [ 41.690671] ? kasan_check_write+0x14/0x20 [ 41.690676] ? fput+0x18/0x120 [ 41.690681] ? ksys_write+0x1ce/0x260 [ 41.690689] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 41.690694] ? do_syscall_64+0x21/0x4e0 [ 41.690703] __x64_sys_sendto+0xdc/0x1a0 [ 41.690711] do_syscall_64+0xd0/0x4e0 [ 41.690719] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 41.690724] RIP: 0033:0x4645a9 [ 41.690729] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 41.690732] RSP: 002b:00007ff7550a5198 EFLAGS: 00000246 ORIG_RAX: 000000000000002c [ 41.690738] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00000000004645a9 [ 41.690741] RDX: 00000000e0ffffff RSI: 00000000200005c0 RDI: 0000000000000003 [ 41.690745] RBP: 000000000051d8e0 R08: 0000000000000000 R09: 00000000000000d8 [ 41.690748] R10: 0000000000000000 R11: 0000000000000246 R12: 000000000055bf00 [ 41.690751] R13: 00007ff7550a56bc R14: 0000000000000005 R15: 0000000000000001 [ 41.822632] FAULT_INJECTION: forcing a failure. [ 41.822632] name failslab, interval 1, probability 0, space 0, times 0 [ 41.822642] CPU: 1 PID: 7283 Comm: syz-executor.1 Not tainted 4.19.201-syzkaller #0 [ 41.822646] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 41.822649] Call Trace: [ 41.822661] dump_stack+0x17c/0x226 [ 41.822673] should_fail.cold.2+0x5/0xa [ 41.822682] ? setup_fault_attr+0x220/0x220 [ 41.822690] ? __kernel_text_address+0xd/0x40 [ 41.822698] ? unwind_get_return_address+0x58/0xa0 [ 41.822709] __should_failslab+0xba/0xf0 [ 41.822717] should_failslab+0x9/0x20 [ 41.822722] __kmalloc+0x6f/0x3d0 [ 41.822729] ? gcmaes_encrypt.constprop.5+0x630/0xda0 [ 41.822836] gcmaes_encrypt.constprop.5+0x630/0xda0 [ 41.822842] ? kasan_kmalloc.part.1+0x62/0xf0 [ 41.822846] ? kasan_kmalloc+0xaf/0xc0 [ 41.822849] ? __kmalloc+0x15d/0x3d0 [ 41.822855] ? tls_push_record+0xff/0x15f0 [ 41.822858] ? tls_sw_sendmsg+0xb35/0x1010 [ 41.822867] ? gcmaes_crypt_by_sg.constprop.6+0x1430/0x1430 [ 41.822878] ? mark_held_locks+0x130/0x130 [ 41.822883] ? mark_held_locks+0xc7/0x130 [ 41.822891] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 41.822896] ? lockdep_hardirqs_on+0x3bb/0x5b0 [ 41.822900] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 41.822910] generic_gcmaes_encrypt+0xfd/0x150 [ 41.822914] ? generic_gcmaes_encrypt+0xfd/0x150 [ 41.822919] ? helper_rfc4106_encrypt+0x450/0x450 [ 41.822928] ? rcu_read_lock_sched_held+0x108/0x120 [ 41.822936] gcmaes_wrapper_encrypt+0x109/0x180 [ 41.822943] tls_push_record+0x9ae/0x15f0 [ 41.822959] tls_sw_sendmsg+0xb35/0x1010 [ 41.822978] ? tls_sw_push_pending_record+0x10/0x10 [ 41.822985] ? do_dup2+0x3f0/0x3f0 [ 41.822989] ? kasan_check_read+0x11/0x20 [ 41.823000] ? aa_sock_msg_perm.isra.2+0x88/0x130 [ 41.823009] inet_sendmsg+0x108/0x440 [ 41.823015] ? security_socket_sendmsg+0x4a/0x90 [ 41.823021] ? inet_recvmsg+0x580/0x580 [ 41.823028] sock_sendmsg+0xac/0xf0 [ 41.823035] __sys_sendto+0x1f2/0x2e0 [ 41.823041] ? __ia32_sys_getpeername+0xb0/0xb0 [ 41.823048] ? kernel_read+0x130/0x130 [ 41.823053] ? __f_unlock_pos+0xd/0x10 [ 41.823059] ? lock_downgrade+0x860/0x860 [ 41.823070] ? kasan_check_write+0x14/0x20 [ 41.823076] ? __mutex_unlock_slowpath+0xe8/0x6a0 [ 41.823089] ? __sb_end_write+0xa4/0xd0 [ 41.823095] ? kasan_check_write+0x14/0x20 [ 41.823100] ? fput+0x18/0x120 [ 41.823106] ? ksys_write+0x1ce/0x260 [ 41.823113] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 41.823119] ? do_syscall_64+0x21/0x4e0 [ 41.823128] __x64_sys_sendto+0xdc/0x1a0 [ 41.823136] do_syscall_64+0xd0/0x4e0 [ 41.823145] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 41.823151] RIP: 0033:0x4645a9 [ 41.823156] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 41.823160] RSP: 002b:00007fcd33544198 EFLAGS: 00000246 ORIG_RAX: 000000000000002c [ 41.823167] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00000000004645a9 [ 41.823170] RDX: 00000000e0ffffff RSI: 00000000200005c0 RDI: 0000000000000003 [ 41.823174] RBP: 000000000051d8e0 R08: 0000000000000000 R09: 00000000000000d8 [ 41.823177] R10: 0000000000000000 R11: 0000000000000246 R12: 000000000055bf00 [ 41.823180] R13: 00007fcd335446bc R14: 0000000000000005 R15: 0000000000000001 [ 41.947010] FAULT_INJECTION: forcing a failure. [ 41.947010] name failslab, interval 1, probability 0, space 0, times 0 [ 41.947020] CPU: 1 PID: 7291 Comm: syz-executor.1 Not tainted 4.19.201-syzkaller #0 [ 41.947024] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 41.947027] Call Trace: [ 41.947037] dump_stack+0x17c/0x226 [ 41.947049] should_fail.cold.2+0x5/0xa [ 41.947058] ? setup_fault_attr+0x220/0x220 [ 41.947066] ? __kernel_text_address+0xd/0x40 [ 41.947074] ? unwind_get_return_address+0x58/0xa0 [ 41.947085] __should_failslab+0xba/0xf0 [ 41.947093] should_failslab+0x9/0x20 [ 41.947098] __kmalloc+0x6f/0x3d0 [ 41.947105] ? gcmaes_encrypt.constprop.5+0x630/0xda0 [ 41.947112] gcmaes_encrypt.constprop.5+0x630/0xda0 [ 41.947117] ? kasan_kmalloc.part.1+0x62/0xf0 [ 41.947121] ? kasan_kmalloc+0xaf/0xc0 [ 41.947125] ? __kmalloc+0x15d/0x3d0 [ 41.947132] ? tls_push_record+0xff/0x15f0 [ 41.947136] ? tls_sw_sendmsg+0xb35/0x1010 [ 41.947145] ? gcmaes_crypt_by_sg.constprop.6+0x1430/0x1430 [ 41.947158] ? mark_held_locks+0x130/0x130 [ 41.947162] ? mark_held_locks+0xc7/0x130 [ 41.947171] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 41.947176] ? lockdep_hardirqs_on+0x3bb/0x5b0 [ 41.947181] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 41.947193] generic_gcmaes_encrypt+0xfd/0x150 [ 41.947198] ? generic_gcmaes_encrypt+0xfd/0x150 [ 41.947203] ? helper_rfc4106_encrypt+0x450/0x450 [ 41.947212] ? rcu_read_lock_sched_held+0x108/0x120 [ 41.947220] gcmaes_wrapper_encrypt+0x109/0x180 [ 41.947227] tls_push_record+0x9ae/0x15f0 [ 41.947241] tls_sw_sendmsg+0xb35/0x1010 [ 41.947258] ? tls_sw_push_pending_record+0x10/0x10 [ 41.947265] ? do_dup2+0x3f0/0x3f0 [ 41.947269] ? kasan_check_read+0x11/0x20 [ 41.947281] ? aa_sock_msg_perm.isra.2+0x88/0x130 [ 41.947290] inet_sendmsg+0x108/0x440 [ 41.947296] ? security_socket_sendmsg+0x4a/0x90 [ 41.947301] ? inet_recvmsg+0x580/0x580 [ 41.947306] sock_sendmsg+0xac/0xf0 [ 41.947312] __sys_sendto+0x1f2/0x2e0 [ 41.947316] ? __ia32_sys_getpeername+0xb0/0xb0 [ 41.947322] ? kernel_read+0x130/0x130 [ 41.947327] ? __f_unlock_pos+0xd/0x10 [ 41.947332] ? lock_downgrade+0x860/0x860 [ 41.947340] ? kasan_check_write+0x14/0x20 [ 41.947346] ? __mutex_unlock_slowpath+0xe8/0x6a0 [ 41.947358] ? __sb_end_write+0xa4/0xd0 [ 41.947365] ? kasan_check_write+0x14/0x20 [ 41.947370] ? fput+0x18/0x120 [ 41.947376] ? ksys_write+0x1ce/0x260 [ 41.947383] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 41.947388] ? do_syscall_64+0x21/0x4e0 [ 41.947396] __x64_sys_sendto+0xdc/0x1a0 [ 41.947403] do_syscall_64+0xd0/0x4e0 [ 41.947413] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 41.947418] RIP: 0033:0x4645a9 [ 41.947424] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 41.947427] RSP: 002b:00007fcd33544198 EFLAGS: 00000246 ORIG_RAX: 000000000000002c [ 41.947434] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00000000004645a9 [ 41.947437] RDX: 00000000e0ffffff RSI: 00000000200005c0 RDI: 0000000000000003 [ 41.947441] RBP: 000000000051d8e0 R08: 0000000000000000 R09: 00000000000000d8 [ 41.947444] R10: 0000000000000000 R11: 0000000000000246 R12: 000000000055bf00 [ 41.947447] R13: 00007fcd335446bc R14: 0000000000000005 R15: 0000000000000001 [ 41.962003] FAULT_INJECTION: forcing a failure. [ 41.962003] name failslab, interval 1, probability 0, space 0, times 0 [ 41.962013] CPU: 1 PID: 7293 Comm: syz-executor.5 Not tainted 4.19.201-syzkaller #0 [ 41.962017] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 41.962020] Call Trace: [ 41.962031] dump_stack+0x17c/0x226 [ 41.962043] should_fail.cold.2+0x5/0xa [ 41.962051] ? setup_fault_attr+0x220/0x220 [ 41.962060] ? __kernel_text_address+0xd/0x40 [ 41.962067] ? unwind_get_return_address+0x58/0xa0 [ 41.962078] __should_failslab+0xba/0xf0 [ 41.962086] should_failslab+0x9/0x20 [ 41.962091] __kmalloc+0x6f/0x3d0 [ 41.962099] ? gcmaes_encrypt.constprop.5+0x630/0xda0 [ 41.962106] gcmaes_encrypt.constprop.5+0x630/0xda0 [ 41.962112] ? kasan_kmalloc.part.1+0x62/0xf0 [ 41.962116] ? kasan_kmalloc+0xaf/0xc0 [ 41.962120] ? __kmalloc+0x15d/0x3d0 [ 41.962128] ? tls_push_record+0xff/0x15f0 [ 41.962133] ? tls_sw_sendmsg+0xb35/0x1010 [ 41.962140] ? gcmaes_crypt_by_sg.constprop.6+0x1430/0x1430 [ 41.962155] ? mark_held_locks+0x130/0x130 [ 41.962160] ? mark_held_locks+0xc7/0x130 [ 41.962168] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 41.962174] ? lockdep_hardirqs_on+0x3bb/0x5b0 [ 41.962179] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 41.962192] generic_gcmaes_encrypt+0xfd/0x150 [ 41.962196] ? generic_gcmaes_encrypt+0xfd/0x150 [ 41.962201] ? helper_rfc4106_encrypt+0x450/0x450 [ 41.962211] ? rcu_read_lock_sched_held+0x108/0x120 [ 41.962219] gcmaes_wrapper_encrypt+0x109/0x180 [ 41.962226] tls_push_record+0x9ae/0x15f0 [ 41.962242] tls_sw_sendmsg+0xb35/0x1010 [ 41.962261] ? tls_sw_push_pending_record+0x10/0x10 [ 41.962269] ? do_dup2+0x3f0/0x3f0 [ 41.962273] ? kasan_check_read+0x11/0x20 [ 41.962285] ? aa_sock_msg_perm.isra.2+0x88/0x130 [ 41.962294] inet_sendmsg+0x108/0x440 [ 41.962300] ? security_socket_sendmsg+0x4a/0x90 [ 41.962306] ? inet_recvmsg+0x580/0x580 [ 41.962312] sock_sendmsg+0xac/0xf0 [ 41.962319] __sys_sendto+0x1f2/0x2e0 [ 41.962325] ? __ia32_sys_getpeername+0xb0/0xb0 [ 41.962331] ? kernel_read+0x130/0x130 [ 41.962336] ? __f_unlock_pos+0xd/0x10 [ 41.962342] ? lock_downgrade+0x860/0x860 [ 41.962354] ? kasan_check_write+0x14/0x20 [ 41.962360] ? __mutex_unlock_slowpath+0xe8/0x6a0 [ 41.962373] ? __sb_end_write+0xa4/0xd0 [ 41.962380] ? kasan_check_write+0x14/0x20 [ 41.962385] ? fput+0x18/0x120 [ 41.962391] ? ksys_write+0x1ce/0x260 [ 41.962398] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 41.962404] ? do_syscall_64+0x21/0x4e0 [ 41.962412] __x64_sys_sendto+0xdc/0x1a0 [ 41.962420] do_syscall_64+0xd0/0x4e0 [ 41.962428] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 41.962434] RIP: 0033:0x4645a9 [ 41.962439] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 41.962442] RSP: 002b:00007f29d197c198 EFLAGS: 00000246 ORIG_RAX: 000000000000002c [ 41.962448] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00000000004645a9 [ 41.962451] RDX: 00000000e0ffffff RSI: 00000000200005c0 RDI: 0000000000000003 [ 41.962455] RBP: 000000000051d8e0 R08: 0000000000000000 R09: 00000000000000d8 [ 41.962458] R10: 0000000000000000 R11: 0000000000000246 R12: 000000000055bf00 [ 41.962461] R13: 00007f29d197c6bc R14: 0000000000000005 R15: 0000000000000001 [ 41.964924] FAULT_INJECTION: forcing a failure. [ 41.964924] name failslab, interval 1, probability 0, space 0, times 0 [ 41.964933] CPU: 1 PID: 7294 Comm: syz-executor.0 Not tainted 4.19.201-syzkaller #0 [ 41.964936] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 41.964938] Call Trace: [ 41.964948] dump_stack+0x17c/0x226 [ 41.964960] should_fail.cold.2+0x5/0xa [ 41.964968] ? setup_fault_attr+0x220/0x220 [ 41.964976] ? __kernel_text_address+0xd/0x40 [ 41.964983] ? unwind_get_return_address+0x58/0xa0 [ 41.964992] __should_failslab+0xba/0xf0 [ 41.964999] should_failslab+0x9/0x20 [ 41.965004] __kmalloc+0x6f/0x3d0 [ 41.965011] ? gcmaes_encrypt.constprop.5+0x630/0xda0 [ 41.965018] gcmaes_encrypt.constprop.5+0x630/0xda0 [ 41.965023] ? kasan_kmalloc.part.1+0x62/0xf0 [ 41.965026] ? kasan_kmalloc+0xaf/0xc0 [ 41.965028] ? __kmalloc+0x15d/0x3d0 [ 41.965033] ? tls_push_record+0xff/0x15f0 [ 41.965037] ? tls_sw_sendmsg+0xb35/0x1010 [ 41.965045] ? gcmaes_crypt_by_sg.constprop.6+0x1430/0x1430 [ 41.965061] ? mark_held_locks+0x130/0x130 [ 41.965066] ? mark_held_locks+0xc7/0x130 [ 41.965073] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 41.965079] ? lockdep_hardirqs_on+0x3bb/0x5b0 [ 41.965084] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 41.965094] generic_gcmaes_encrypt+0xfd/0x150 [ 41.965098] ? generic_gcmaes_encrypt+0xfd/0x150 [ 41.965103] ? helper_rfc4106_encrypt+0x450/0x450 [ 41.965112] ? rcu_read_lock_sched_held+0x108/0x120 [ 41.965119] gcmaes_wrapper_encrypt+0x109/0x180 [ 41.965126] tls_push_record+0x9ae/0x15f0 [ 41.965140] tls_sw_sendmsg+0xb35/0x1010 [ 41.965158] ? tls_sw_push_pending_record+0x10/0x10 [ 41.965165] ? do_dup2+0x3f0/0x3f0 [ 41.965169] ? kasan_check_read+0x11/0x20 [ 41.965181] ? aa_sock_msg_perm.isra.2+0x88/0x130 [ 41.965190] inet_sendmsg+0x108/0x440 [ 41.965196] ? security_socket_sendmsg+0x4a/0x90 [ 41.965200] ? inet_recvmsg+0x580/0x580 [ 41.965205] sock_sendmsg+0xac/0xf0 [ 41.965211] __sys_sendto+0x1f2/0x2e0 [ 41.965216] ? __ia32_sys_getpeername+0xb0/0xb0 [ 41.965221] ? kernel_read+0x130/0x130 [ 41.965225] ? __f_unlock_pos+0xd/0x10 [ 41.965230] ? lock_downgrade+0x860/0x860 [ 41.965241] ? kasan_check_write+0x14/0x20 [ 41.965247] ? __mutex_unlock_slowpath+0xe8/0x6a0 [ 41.965258] ? __sb_end_write+0xa4/0xd0 [ 41.965265] ? kasan_check_write+0x14/0x20 [ 41.965269] ? fput+0x18/0x120 [ 41.965276] ? ksys_write+0x1ce/0x260 [ 41.965282] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 41.965288] ? do_syscall_64+0x21/0x4e0 [ 41.965296] __x64_sys_sendto+0xdc/0x1a0 [ 41.965304] do_syscall_64+0xd0/0x4e0 [ 41.965313] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 41.965319] RIP: 0033:0x4645a9 [ 41.965324] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 41.965327] RSP: 002b:00007fe6ff8b0198 EFLAGS: 00000246 ORIG_RAX: 000000000000002c [ 41.965333] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00000000004645a9 [ 41.965337] RDX: 00000000e0ffffff RSI: 00000000200005c0 RDI: 0000000000000003 [ 41.965340] RBP: 000000000051d8e0 R08: 0000000000000000 R09: 00000000000000d8 [ 41.965343] R10: 0000000000000000 R11: 0000000000000246 R12: 000000000055bf00 [ 41.965346] R13: 00007fe6ff8b06bc R14: 0000000000000005 R15: 0000000000000001 [ 41.965804] FAULT_INJECTION: forcing a failure. [ 41.965804] name failslab, interval 1, probability 0, space 0, times 0 [ 41.965810] CPU: 1 PID: 7295 Comm: syz-executor.4 Not tainted 4.19.201-syzkaller #0 [ 41.965813] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 41.965816] Call Trace: [ 41.965822] dump_stack+0x17c/0x226 [ 41.965831] should_fail.cold.2+0x5/0xa [ 41.965840] ? setup_fault_attr+0x220/0x220 [ 41.965846] ? __kernel_text_address+0xd/0x40 [ 41.965853] ? unwind_get_return_address+0x58/0xa0 [ 41.965863] __should_failslab+0xba/0xf0 [ 41.965870] should_failslab+0x9/0x20 [ 41.965875] __kmalloc+0x6f/0x3d0 [ 41.965881] ? gcmaes_encrypt.constprop.5+0x630/0xda0 [ 41.965888] gcmaes_encrypt.constprop.5+0x630/0xda0 [ 41.965893] ? kasan_kmalloc.part.1+0x62/0xf0 [ 41.965896] ? kasan_kmalloc+0xaf/0xc0 [ 41.965900] ? __kmalloc+0x15d/0x3d0 [ 41.965905] ? tls_push_record+0xff/0x15f0 [ 41.965908] ? tls_sw_sendmsg+0xb35/0x1010 [ 41.965918] ? gcmaes_crypt_by_sg.constprop.6+0x1430/0x1430 [ 41.965929] ? mark_held_locks+0x130/0x130 [ 41.965934] ? mark_held_locks+0xc7/0x130 [ 41.965941] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 41.965946] ? lockdep_hardirqs_on+0x3bb/0x5b0 [ 41.965950] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 41.965961] generic_gcmaes_encrypt+0xfd/0x150 [ 41.965964] ? generic_gcmaes_encrypt+0xfd/0x150 [ 41.965969] ? helper_rfc4106_encrypt+0x450/0x450 [ 41.965977] ? rcu_read_lock_sched_held+0x108/0x120 [ 41.965984] gcmaes_wrapper_encrypt+0x109/0x180 [ 41.965990] tls_push_record+0x9ae/0x15f0 [ 41.966004] tls_sw_sendmsg+0xb35/0x1010 [ 41.966023] ? tls_sw_push_pending_record+0x10/0x10 [ 41.966029] ? do_dup2+0x3f0/0x3f0 [ 41.966033] ? kasan_check_read+0x11/0x20 [ 41.966042] ? aa_sock_msg_perm.isra.2+0x88/0x130 [ 41.966050] inet_sendmsg+0x108/0x440 [ 41.966055] ? security_socket_sendmsg+0x4a/0x90 [ 41.966060] ? inet_recvmsg+0x580/0x580 [ 41.966066] sock_sendmsg+0xac/0xf0 [ 41.966072] __sys_sendto+0x1f2/0x2e0 [ 41.966078] ? __ia32_sys_getpeername+0xb0/0xb0 [ 41.966083] ? kernel_read+0x130/0x130 [ 41.966087] ? __f_unlock_pos+0xd/0x10 [ 41.966092] ? lock_downgrade+0x860/0x860 [ 41.966103] ? kasan_check_write+0x14/0x20 [ 41.966108] ? __mutex_unlock_slowpath+0xe8/0x6a0 [ 41.966119] ? __sb_end_write+0xa4/0xd0 [ 41.966126] ? kasan_check_write+0x14/0x20 [ 41.966130] ? fput+0x18/0x120 [ 41.966134] ? ksys_write+0x1ce/0x260 [ 41.966140] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 41.966146] ? do_syscall_64+0x21/0x4e0 [ 41.966154] __x64_sys_sendto+0xdc/0x1a0 [ 41.966161] do_syscall_64+0xd0/0x4e0 [ 41.966169] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 41.966174] RIP: 0033:0x4645a9 [ 41.966178] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 41.966182] RSP: 002b:00007f881e59a198 EFLAGS: 00000246 ORIG_RAX: 000000000000002c [ 41.966187] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00000000004645a9 [ 41.966190] RDX: 00000000e0ffffff RSI: 00000000200005c0 RDI: 0000000000000003 [ 41.966193] RBP: 000000000051d8e0 R08: 0000000000000000 R09: 00000000000000d8 [ 41.966196] R10: 0000000000000000 R11: 0000000000000246 R12: 000000000055bf00 [ 41.966199] R13: 00007f881e59a6bc R14: 0000000000000005 R15: 0000000000000001 [ 41.970703] FAULT_INJECTION: forcing a failure. [ 41.970703] name failslab, interval 1, probability 0, space 0, times 0 [ 41.970712] CPU: 0 PID: 7296 Comm: syz-executor.2 Not tainted 4.19.201-syzkaller #0 [ 41.970715] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 41.970718] Call Trace: [ 41.970728] dump_stack+0x17c/0x226 [ 41.970739] should_fail.cold.2+0x5/0xa [ 41.970747] ? setup_fault_attr+0x220/0x220 [ 41.970754] ? __kernel_text_address+0xd/0x40 [ 41.970761] ? unwind_get_return_address+0x58/0xa0 [ 41.970772] __should_failslab+0xba/0xf0 [ 41.970780] should_failslab+0x9/0x20 [ 41.970785] __kmalloc+0x6f/0x3d0 [ 41.970792] ? gcmaes_encrypt.constprop.5+0x630/0xda0 [ 41.970800] gcmaes_encrypt.constprop.5+0x630/0xda0 [ 41.970804] ? kasan_kmalloc.part.1+0x62/0xf0 [ 41.970809] ? kasan_kmalloc+0xaf/0xc0 [ 41.970812] ? __kmalloc+0x15d/0x3d0 [ 41.970819] ? tls_push_record+0xff/0x15f0 [ 41.970823] ? tls_sw_sendmsg+0xb35/0x1010 [ 41.970832] ? gcmaes_crypt_by_sg.constprop.6+0x1430/0x1430 [ 41.970846] ? mark_held_locks+0x130/0x130 [ 41.970851] ? mark_held_locks+0xc7/0x130 [ 41.970859] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 41.970865] ? lockdep_hardirqs_on+0x3bb/0x5b0 [ 41.970870] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 41.970882] generic_gcmaes_encrypt+0xfd/0x150 [ 41.970887] ? generic_gcmaes_encrypt+0xfd/0x150 [ 41.970892] ? helper_rfc4106_encrypt+0x450/0x450 [ 41.970901] ? rcu_read_lock_sched_held+0x108/0x120 [ 41.970908] gcmaes_wrapper_encrypt+0x109/0x180 [ 41.970914] tls_push_record+0x9ae/0x15f0 [ 41.970930] tls_sw_sendmsg+0xb35/0x1010 [ 41.970947] ? tls_sw_push_pending_record+0x10/0x10 [ 41.970954] ? do_dup2+0x3f0/0x3f0 [ 41.970958] ? kasan_check_read+0x11/0x20 [ 41.970968] ? aa_sock_msg_perm.isra.2+0x88/0x130 [ 41.970978] inet_sendmsg+0x108/0x440 [ 41.970984] ? security_socket_sendmsg+0x4a/0x90 [ 41.970990] ? inet_recvmsg+0x580/0x580 [ 41.970995] sock_sendmsg+0xac/0xf0 [ 41.971002] __sys_sendto+0x1f2/0x2e0 [ 41.971008] ? __ia32_sys_getpeername+0xb0/0xb0 [ 41.971015] ? kernel_read+0x130/0x130 [ 41.971020] ? __f_unlock_pos+0xd/0x10 [ 41.971026] ? lock_downgrade+0x860/0x860 [ 41.971036] ? kasan_check_write+0x14/0x20 [ 41.971041] ? __mutex_unlock_slowpath+0xe8/0x6a0 [ 41.971053] ? __sb_end_write+0xa4/0xd0 [ 41.971060] ? kasan_check_write+0x14/0x20 [ 41.971065] ? fput+0x18/0x120 [ 41.971070] ? ksys_write+0x1ce/0x260 [ 41.971077] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 41.971083] ? do_syscall_64+0x21/0x4e0 [ 41.971091] __x64_sys_sendto+0xdc/0x1a0 [ 41.971099] do_syscall_64+0xd0/0x4e0 [ 41.971108] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 41.971113] RIP: 0033:0x4645a9 [ 41.971118] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 41.971121] RSP: 002b:00007ff7550a5198 EFLAGS: 00000246 ORIG_RAX: 000000000000002c [ 41.971127] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00000000004645a9 [ 41.971130] RDX: 00000000e0ffffff RSI: 00000000200005c0 RDI: 0000000000000003 [ 41.971143] RBP: 000000000051d8e0 R08: 0000000000000000 R09: 00000000000000d8 [ 41.971147] R10: 0000000000000000 R11: 0000000000000246 R12: 000000000055bf00 [ 41.971150] R13: 00007ff7550a56bc R14: 0000000000000005 R15: 0000000000000001 [ 42.034917] FAULT_INJECTION: forcing a failure. [ 42.034917] name failslab, interval 1, probability 0, space 0, times 0 [ 42.072174] FAULT_INJECTION: forcing a failure. [ 42.072174] name failslab, interval 1, probability 0, space 0, times 0 [ 42.251743] CPU: 0 PID: 7298 Comm: syz-executor.3 Not tainted 4.19.201-syzkaller #0 [ 42.456834] FAULT_INJECTION: forcing a failure. [ 42.456834] name failslab, interval 1, probability 0, space 0, times 0 [ 42.457134] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 42.463327] FAULT_INJECTION: forcing a failure. [ 42.463327] name failslab, interval 1, probability 0, space 0, times 0 [ 42.465653] Call Trace: [ 42.465665] dump_stack+0x17c/0x226 [ 42.465676] should_fail.cold.2+0x5/0xa [ 42.465691] ? setup_fault_attr+0x220/0x220 [ 48.784983] ? __kernel_text_address+0xd/0x40 [ 48.789464] ? unwind_get_return_address+0x58/0xa0 [ 48.794482] __should_failslab+0xba/0xf0 [ 48.799205] should_failslab+0x9/0x20 [ 48.802990] __kmalloc+0x6f/0x3d0 [ 48.806444] ? gcmaes_encrypt.constprop.5+0x630/0xda0 [ 48.811625] gcmaes_encrypt.constprop.5+0x630/0xda0 [ 48.816983] ? kasan_kmalloc.part.1+0x62/0xf0 [ 48.821456] ? kasan_kmalloc+0xaf/0xc0 [ 48.825755] ? __kmalloc+0x15d/0x3d0 [ 48.829449] ? tls_push_record+0xff/0x15f0 [ 48.833679] ? tls_sw_sendmsg+0xb35/0x1010 [ 48.838000] ? gcmaes_crypt_by_sg.constprop.6+0x1430/0x1430 [ 48.843696] ? mark_held_locks+0x130/0x130 [ 48.847911] ? mark_held_locks+0xc7/0x130 [ 48.852053] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 48.856968] ? lockdep_hardirqs_on+0x3bb/0x5b0 [ 48.861545] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 48.866291] generic_gcmaes_encrypt+0xfd/0x150 [ 48.870862] ? generic_gcmaes_encrypt+0xfd/0x150 [ 48.875600] ? helper_rfc4106_encrypt+0x450/0x450 [ 48.880433] ? rcu_read_lock_sched_held+0x108/0x120 [ 48.885431] gcmaes_wrapper_encrypt+0x109/0x180 [ 48.890090] tls_push_record+0x9ae/0x15f0 [ 48.894337] tls_sw_sendmsg+0xb35/0x1010 [ 48.898402] ? tls_sw_push_pending_record+0x10/0x10 [ 48.903403] ? do_dup2+0x3f0/0x3f0 [ 48.906921] ? kasan_check_read+0x11/0x20 [ 48.911053] ? aa_sock_msg_perm.isra.2+0x88/0x130 [ 48.915891] inet_sendmsg+0x108/0x440 [ 48.919962] ? security_socket_sendmsg+0x4a/0x90 [ 48.924698] ? inet_recvmsg+0x580/0x580 [ 48.928650] sock_sendmsg+0xac/0xf0 [ 48.932258] __sys_sendto+0x1f2/0x2e0 [ 48.936038] ? __ia32_sys_getpeername+0xb0/0xb0 [ 48.940771] ? kernel_read+0x130/0x130 [ 48.944642] ? __f_unlock_pos+0xd/0x10 [ 48.948513] ? lock_downgrade+0x860/0x860 [ 48.952655] ? kasan_check_write+0x14/0x20 [ 48.956873] ? __mutex_unlock_slowpath+0xe8/0x6a0 [ 48.961709] ? __sb_end_write+0xa4/0xd0 [ 48.965661] ? kasan_check_write+0x14/0x20 [ 48.969893] ? fput+0x18/0x120 [ 48.973064] ? ksys_write+0x1ce/0x260 [ 48.977024] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 48.982019] ? do_syscall_64+0x21/0x4e0 [ 48.986069] __x64_sys_sendto+0xdc/0x1a0 [ 48.990200] do_syscall_64+0xd0/0x4e0 [ 48.994071] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 48.999432] RIP: 0033:0x4645a9 [ 49.002604] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 49.021482] RSP: 002b:00007f8052add198 EFLAGS: 00000246 ORIG_RAX: 000000000000002c 2021/08/06 01:52:21 executed programs: 31 [ 49.029341] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00000000004645a9 [ 49.036981] RDX: 00000000e0ffffff RSI: 00000000200005c0 RDI: 0000000000000003 [ 49.044491] RBP: 000000000051d8e0 R08: 0000000000000000 R09: 00000000000000d8 [ 49.051738] R10: 0000000000000000 R11: 0000000000000246 R12: 000000000055bf00 [ 49.059158] R13: 00007f8052add6bc R14: 0000000000000005 R15: 0000000000000001 [ 49.110379] CPU: 1 PID: 7304 Comm: syz-executor.5 Not tainted 4.19.201-syzkaller #0 [ 49.118191] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 49.127540] Call Trace: [ 49.130123] dump_stack+0x17c/0x226 [ 49.133843] should_fail.cold.2+0x5/0xa [ 49.137816] ? setup_fault_attr+0x220/0x220 [ 49.142136] ? __kernel_text_address+0xd/0x40 [ 49.144187] net_ratelimit: 21 callbacks suppressed [ 49.144192] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 49.146625] ? unwind_get_return_address+0x58/0xa0 [ 49.146637] __should_failslab+0xba/0xf0 [ 49.146646] should_failslab+0x9/0x20 [ 49.146651] __kmalloc+0x6f/0x3d0 [ 49.146659] ? gcmaes_encrypt.constprop.5+0x630/0xda0 [ 49.146667] gcmaes_encrypt.constprop.5+0x630/0xda0 [ 49.146672] ? kasan_kmalloc.part.1+0x62/0xf0 [ 49.146677] ? kasan_kmalloc+0xaf/0xc0 [ 49.146681] ? __kmalloc+0x15d/0x3d0 [ 49.146688] ? tls_push_record+0xff/0x15f0 [ 49.146692] ? tls_sw_sendmsg+0xb35/0x1010 [ 49.146700] ? gcmaes_crypt_by_sg.constprop.6+0x1430/0x1430 [ 49.146711] ? mark_held_locks+0x130/0x130 [ 49.146715] ? mark_held_locks+0xc7/0x130 [ 49.146723] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 49.146728] ? lockdep_hardirqs_on+0x3bb/0x5b0 [ 49.146732] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 49.146742] generic_gcmaes_encrypt+0xfd/0x150 [ 49.146747] ? generic_gcmaes_encrypt+0xfd/0x150 [ 49.146752] ? helper_rfc4106_encrypt+0x450/0x450 [ 49.146761] ? rcu_read_lock_sched_held+0x108/0x120 [ 49.146769] gcmaes_wrapper_encrypt+0x109/0x180 [ 49.146776] tls_push_record+0x9ae/0x15f0 [ 49.146792] tls_sw_sendmsg+0xb35/0x1010 [ 49.146811] ? tls_sw_push_pending_record+0x10/0x10 [ 49.146819] ? do_dup2+0x3f0/0x3f0 [ 49.146823] ? kasan_check_read+0x11/0x20 [ 49.146834] ? aa_sock_msg_perm.isra.2+0x88/0x130 [ 49.146844] inet_sendmsg+0x108/0x440 [ 49.146851] ? security_socket_sendmsg+0x4a/0x90 [ 49.146856] ? inet_recvmsg+0x580/0x580 [ 49.146863] sock_sendmsg+0xac/0xf0 [ 49.146870] __sys_sendto+0x1f2/0x2e0 [ 49.146876] ? __ia32_sys_getpeername+0xb0/0xb0 [ 49.146883] ? kernel_read+0x130/0x130 [ 49.146888] ? __f_unlock_pos+0xd/0x10 [ 49.146894] ? lock_downgrade+0x860/0x860 [ 49.146905] ? kasan_check_write+0x14/0x20 [ 49.146911] ? __mutex_unlock_slowpath+0xe8/0x6a0 [ 49.146929] ? __sb_end_write+0xa4/0xd0 [ 49.146936] ? kasan_check_write+0x14/0x20 [ 49.146940] ? fput+0x18/0x120 [ 49.146945] ? ksys_write+0x1ce/0x260 [ 49.146952] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 49.146958] ? do_syscall_64+0x21/0x4e0 [ 49.146966] __x64_sys_sendto+0xdc/0x1a0 [ 49.146975] do_syscall_64+0xd0/0x4e0 [ 49.146983] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 49.146989] RIP: 0033:0x4645a9 [ 49.146995] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 49.146999] RSP: 002b:00007f29d197c198 EFLAGS: 00000246 ORIG_RAX: 000000000000002c [ 49.147005] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00000000004645a9 [ 49.147008] RDX: 00000000e0ffffff RSI: 00000000200005c0 RDI: 0000000000000003 [ 49.147012] RBP: 000000000051d8e0 R08: 0000000000000000 R09: 00000000000000d8 [ 49.147015] R10: 0000000000000000 R11: 0000000000000246 R12: 000000000055bf00 [ 49.147018] R13: 00007f29d197c6bc R14: 0000000000000005 R15: 0000000000000001 [ 49.150373] CPU: 1 PID: 7316 Comm: syz-executor.1 Not tainted 4.19.201-syzkaller #0 [ 49.208981] ================================================================== [ 49.210854] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 49.210860] Call Trace: [ 49.210872] dump_stack+0x17c/0x226 [ 49.216642] BUG: KASAN: use-after-free in tls_push_record+0x116e/0x15f0 [ 49.220871] should_fail.cold.2+0x5/0xa [ 49.224984] Write of size 1 at addr ffff8881edbd8000 by task syz-executor.3/7298 [ 49.224987] [ 49.229719] ? setup_fault_attr+0x220/0x220 [ 49.493803] __should_failslab+0xba/0xf0 [ 49.497852] should_failslab+0x9/0x20 [ 49.501723] kmem_cache_alloc_node+0x25a/0x3e0 [ 49.506388] __alloc_skb+0xa7/0x580 [ 49.510012] ? __kmalloc_reserve.isra.9+0xc0/0xc0 [ 49.514844] ? lockdep_hardirqs_on+0x3bb/0x5b0 [ 49.519410] ? __local_bh_enable_ip+0x160/0x250 [ 49.524147] ? trace_hardirqs_on+0x28/0x190 [ 49.528538] ? __sk_flush_backlog+0x29/0x30 [ 49.532947] sk_stream_alloc_skb+0x9e/0x800 [ 49.537254] ? tcp_send_mss+0x1d/0x220 [ 49.541148] tcp_sendmsg_locked+0xa07/0x3710 [ 49.545550] ? tcp_sendpage+0x50/0x50 [ 49.549344] ? mark_held_locks+0xc7/0x130 [ 49.553559] ? __local_bh_enable_ip+0x160/0x250 [ 49.558474] ? lock_sock_nested+0xc5/0x100 [ 49.562790] ? lockdep_hardirqs_on+0x3bb/0x5b0 [ 49.567353] ? __local_bh_enable_ip+0x160/0x250 [ 49.572115] ? trace_hardirqs_on+0x28/0x190 [ 49.576593] ? lock_sock_nested+0x82/0x100 [ 49.580923] ? lock_sock_nested+0x82/0x100 [ 49.585229] ? __local_bh_enable_ip+0x160/0x250 [ 49.589989] tcp_sendmsg+0x27/0x40 [ 49.593543] inet_sendmsg+0x108/0x440 [ 49.597348] ? security_socket_sendmsg+0x4a/0x90 [ 49.602104] ? inet_recvmsg+0x580/0x580 [ 49.606072] sock_sendmsg+0xac/0xf0 [ 49.609772] __sys_sendto+0x1f2/0x2e0 [ 49.613736] ? __ia32_sys_getpeername+0xb0/0xb0 [ 49.618386] ? kernel_read+0x130/0x130 [ 49.622253] ? __f_unlock_pos+0xd/0x10 [ 49.626131] ? lock_downgrade+0x860/0x860 [ 49.630265] ? kasan_check_write+0x14/0x20 [ 49.634490] ? __mutex_unlock_slowpath+0xe8/0x6a0 [ 49.639424] ? __sb_end_write+0xa4/0xd0 [ 49.643384] ? kasan_check_write+0x14/0x20 [ 49.647607] ? fput+0x18/0x120 [ 49.650793] ? ksys_write+0x1ce/0x260 [ 49.654582] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 49.659334] ? do_syscall_64+0x21/0x4e0 [ 49.663479] __x64_sys_sendto+0xdc/0x1a0 [ 49.667538] do_syscall_64+0xd0/0x4e0 [ 49.671349] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 49.676618] RIP: 0033:0x4645a9 [ 49.679816] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 49.698702] RSP: 002b:00007fcd33523198 EFLAGS: 00000246 ORIG_RAX: 000000000000002c [ 49.706391] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00000000004645a9 [ 49.713728] RDX: 00000000e0ffffff RSI: 00000000200005c0 RDI: 0000000000000003 [ 49.721358] RBP: 000000000051d8e0 R08: 0000000000000000 R09: 00000000000000d8 [ 49.728874] R10: 0000000000000000 R11: 0000000000000246 R12: 000000000055bfa0 [ 49.736129] R13: 00007fcd335236bc R14: 0000000000000005 R15: 0000000000000001 [ 49.743399] CPU: 0 PID: 7298 Comm: syz-executor.3 Not tainted 4.19.201-syzkaller #0 [ 49.751206] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 49.760653] Call Trace: [ 49.763248] dump_stack+0x17c/0x226 [ 49.766877] print_address_description.cold.6+0x9/0x211 [ 49.772325] kasan_report.cold.7+0x242/0x2fe [ 49.776759] ? tls_push_record+0x116e/0x15f0 [ 49.781250] __asan_report_store1_noabort+0x17/0x20 [ 49.786702] tls_push_record+0x116e/0x15f0 [ 49.790942] ? __local_bh_enable_ip+0x160/0x250 [ 49.795615] tls_sw_push_pending_record+0xe/0x10 [ 49.800369] tls_push_pending_closed_record+0xbc/0x100 [ 49.805643] tls_sk_proto_close+0x479/0x980 [ 49.810056] ? tcp_check_oom+0x4b0/0x4b0 [ 49.814114] ? tls_write_space+0x2b0/0x2b0 [ 49.818342] inet_release+0xb4/0x1b0 [ 49.822052] inet6_release+0x46/0x60 [ 49.825754] __sock_release+0xc2/0x290 [ 49.829632] sock_close+0x10/0x20 [ 49.833076] __fput+0x249/0x7f0 [ 49.836339] ____fput+0x9/0x10 [ 49.839537] task_work_run+0x108/0x180 [ 49.841349] page:ffffea000749fc00 count:0 mapcount:-128 mapping:0000000000000000 index:0x0 [ 49.843498] do_exit+0xa6a/0x2d90 [ 49.843510] ? mm_update_next_owner+0x680/0x680 [ 49.860535] ? tls_sw_push_pending_record+0x10/0x10 [ 49.865540] ? get_signal+0x2ba/0x1970 [ 49.869430] ? _raw_spin_unlock_irq+0x27/0x90 [ 49.874003] ? get_signal+0x2ba/0x1970 [ 49.878079] do_group_exit+0xf8/0x2c0 [ 49.880214] flags: 0x17ffe0000000000() [ 49.882049] get_signal+0x30b/0x1970 [ 49.885919] raw: 017ffe0000000000 ffffea0007478608 ffffea0007832408 0000000000000000 [ 49.889637] ? __sys_sendto+0x28d/0x2e0 [ 49.901455] do_signal+0x87/0x1870 [ 49.904982] ? kasan_check_write+0x14/0x20 [ 49.909278] ? __mutex_unlock_slowpath+0xe8/0x6a0 [ 49.914120] ? setup_sigcontext+0x7d0/0x7d0 [ 49.918445] ? __sb_end_write+0xa4/0xd0 [ 49.922417] ? kasan_check_write+0x14/0x20 [ 49.926743] ? fput+0x18/0x120 [ 49.930706] ? ksys_write+0x1ce/0x260 [ 49.934500] ? exit_to_usermode_loop+0x3a/0x1e0 [ 49.939180] ? do_syscall_64+0x413/0x4e0 [ 49.940239] raw: 0000000000000000 0000000000000003 00000000ffffff7f 0000000000000000 [ 49.943237] ? lockdep_hardirqs_on+0x3bb/0x5b0 [ 49.955938] ? exit_to_usermode_loop+0x3a/0x1e0 [ 49.960596] ? trace_hardirqs_on+0x28/0x190 [ 49.964909] exit_to_usermode_loop+0x159/0x1e0 [ 49.969496] do_syscall_64+0x413/0x4e0 [ 49.973381] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 49.978551] RIP: 0033:0x4645a9 [ 49.980215] page dumped because: VM_BUG_ON_PAGE(page_ref_count(page) == 0) [ 49.982185] Code: Bad RIP value. [ 49.989333] ------------[ cut here ]------------ [ 49.992645] RSP: 002b:00007f8052add198 EFLAGS: 00000246 ORIG_RAX: 000000000000002c [ 49.997464] kernel BUG at include/linux/mm.h:519! [ 50.005233] RAX: 0000000000004000 RBX: 0000000000000000 RCX: 00000000004645a9 [ 50.017408] RDX: 00000000e0ffffff RSI: 00000000200005c0 RDI: 0000000000000003 [ 50.024668] RBP: 000000000051d8e0 R08: 0000000000000000 R09: 00000000000000d8 [ 50.031926] R10: 0000000000000000 R11: 0000000000000246 R12: 000000000055bf00 [ 50.039299] R13: 00007f8052add6bc R14: 0000000000000005 R15: 0000000000000001 [ 50.046570] [ 50.046575] CPU: 1 PID: 7317 Comm: syz-executor.4 Not tainted 4.19.201-syzkaller #0 [ 50.046580] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 50.048181] The buggy address belongs to the page: [ 50.056151] Call Trace: [ 50.065849] page:ffffea0007b6f600 count:0 mapcount:-128 mapping:0000000000000000 index:0x0 [ 50.070789] dump_stack+0x17c/0x226 [ 50.073369] flags: 0x17ffe0000000000() [ 50.081773] should_fail.cold.2+0x5/0xa [ 50.085372] raw: 017ffe0000000000 ffffea0007454c08 ffffea000748fa08 0000000000000000 [ 50.089339] ? setup_fault_attr+0x220/0x220 [ 50.093295] raw: 0000000000000000 0000000000000003 00000000ffffff7f 0000000000000000 [ 50.101178] __should_failslab+0xba/0xf0 [ 50.105550] page dumped because: kasan: bad access detected [ 50.113610] should_failslab+0x9/0x20 [ 50.117680] [ 50.123371] kmem_cache_alloc_node+0x25a/0x3e0 [ 50.127167] Memory state around the buggy address: [ 50.128869] __alloc_skb+0xa7/0x580 [ 50.133428] ffff8881edbd7f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 50.138444] ? __kmalloc_reserve.isra.9+0xc0/0xc0 [ 50.142139] ffff8881edbd7f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 50.149565] ? lockdep_hardirqs_on+0x3bb/0x5b0 [ 50.154641] >ffff8881edbd8000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 50.161981] ? __local_bh_enable_ip+0x160/0x250 [ 50.166535] ^ [ 50.166540] ffff8881edbd8080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 50.173894] ? trace_hardirqs_on+0x28/0x190 [ 50.178543] ffff8881edbd8100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 50.182325] ? __sk_flush_backlog+0x29/0x30 [ 50.189743] ================================================================== [ 50.194050] sk_stream_alloc_skb+0x9e/0x800 [ 50.201402] Disabling lock debugging due to kernel taint [ 50.205715] ? tcp_send_mss+0x1d/0x220 [ 50.226925] tcp_sendmsg_locked+0xa07/0x3710 [ 50.227844] page:ffffea0007b6f600 count:0 mapcount:-128 mapping:0000000000000000 index:0x0 [ 50.231326] ? tcp_sendpage+0x50/0x50 [ 50.231340] ? mark_held_locks+0xc7/0x130 [ 50.231346] ? __local_bh_enable_ip+0x160/0x250 [ 50.231351] ? lock_sock_nested+0xc5/0x100 [ 50.231355] ? lockdep_hardirqs_on+0x3bb/0x5b0 [ 50.231358] ? __local_bh_enable_ip+0x160/0x250 [ 50.231363] ? trace_hardirqs_on+0x28/0x190 [ 50.231368] ? lock_sock_nested+0x82/0x100 [ 50.240126] flags: 0x17ffe0000000000() [ 50.243819] ? lock_sock_nested+0x82/0x100 [ 50.243825] ? __local_bh_enable_ip+0x160/0x250 [ 50.243831] tcp_sendmsg+0x27/0x40 [ 50.243839] inet_sendmsg+0x108/0x440 [ 50.243845] ? security_socket_sendmsg+0x4a/0x90 [ 50.243849] ? inet_recvmsg+0x580/0x580 [ 50.243852] sock_sendmsg+0xac/0xf0 [ 50.243857] __sys_sendto+0x1f2/0x2e0 [ 50.248065] raw: 017ffe0000000000 ffffea0007454c08 ffffea000748fa08 0000000000000000 [ 50.253509] ? __ia32_sys_getpeername+0xb0/0xb0 [ 50.253515] ? kernel_read+0x130/0x130 [ 50.253519] ? __f_unlock_pos+0xd/0x10 [ 50.253526] ? lock_downgrade+0x860/0x860 [ 50.253534] ? kasan_check_write+0x14/0x20 [ 50.253539] ? __mutex_unlock_slowpath+0xe8/0x6a0 [ 50.253546] ? __sb_end_write+0xa4/0xd0 [ 50.253550] ? kasan_check_write+0x14/0x20 [ 50.253553] ? fput+0x18/0x120 [ 50.253557] ? ksys_write+0x1ce/0x260 [ 50.257868] raw: 0000000000000000 0000000000000003 00000000ffffff7f 0000000000000000 [ 50.262345] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 50.262349] ? do_syscall_64+0x21/0x4e0 [ 50.262356] __x64_sys_sendto+0xdc/0x1a0 [ 50.262362] do_syscall_64+0xd0/0x4e0 [ 50.262369] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 50.262373] RIP: 0033:0x4645a9 [ 50.262378] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 50.262380] RSP: 002b:00007f881e579198 EFLAGS: 00000246 ORIG_RAX: 000000000000002c [ 50.262385] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00000000004645a9 [ 50.262388] RDX: 00000000e0ffffff RSI: 00000000200005c0 RDI: 0000000000000003 [ 50.267114] page dumped because: VM_BUG_ON_PAGE(page_ref_count(page) == 0) [ 50.271335] RBP: 000000000051d8e0 R08: 0000000000000000 R09: 00000000000000d8 [ 50.271338] R10: 0000000000000000 R11: 0000000000000246 R12: 000000000055bfa0 [ 50.271340] R13: 00007f881e5796bc R14: 0000000000000005 R15: 0000000000000001 [ 50.290102] invalid opcode: 0000 [#1] PREEMPT SMP KASAN [ 50.302444] ------------[ cut here ]------------ [ 50.305101] CPU: 1 PID: 7304 Comm: syz-executor.5 Tainted: G B 4.19.201-syzkaller #0 [ 50.308710] kernel BUG at include/linux/mm.h:519! [ 50.491592] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 50.500954] RIP: 0010:tls_sk_proto_close+0x63e/0x980 [ 50.506178] Code: 5f 7c ff 48 8b b5 50 ff ff ff 4c 89 ff 48 8b 85 58 ff ff ff ff d0 e9 0c ff ff ff 48 c7 c6 00 be c9 87 4c 89 f7 e8 32 b8 b1 fb <0f> 0b be 00 00 10 00 4c 89 ff e8 63 ce 7b ff e9 8e fd ff ff 49 8d [ 50.525238] RSP: 0018:ffff8881edf97860 EFLAGS: 00010246 [ 50.530666] RAX: dffffc0000000000 RBX: ffff8881e969f000 RCX: 0000000000000000 [ 50.538025] RDX: 1ffffd4000e93f87 RSI: 0000000000000000 RDI: ffffea000749fc38 [ 50.545271] RBP: ffff8881edf97920 R08: ffffed103ed23eef R09: ffffed103ed23eee [ 50.552725] R10: ffffed103ed23eee R11: ffff8881f691f777 R12: ffff8881ee284c20 [ 50.560167] R13: dffffc0000000000 R14: ffffea000749fc00 R15: ffff8881d996ce00 [ 50.567601] FS: 00007f29d197c700(0000) GS:ffff8881f6900000(0000) knlGS:0000000000000000 [ 50.575898] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 50.581839] CR2: 00007fd640c3a000 CR3: 000000000846d001 CR4: 00000000001606e0 [ 50.589085] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 50.596429] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 50.603730] Call Trace: [ 50.606295] ? tcp_check_oom+0x4b0/0x4b0 [ 50.610518] ? tls_write_space+0x2b0/0x2b0 [ 50.614839] inet_release+0xb4/0x1b0 [ 50.618540] inet6_release+0x46/0x60 [ 50.622236] __sock_release+0xc2/0x290 [ 50.626114] sock_close+0x10/0x20 [ 50.629651] __fput+0x249/0x7f0 [ 50.632918] ____fput+0x9/0x10 [ 50.636087] task_work_run+0x108/0x180 [ 50.639948] do_exit+0xa6a/0x2d90 [ 50.643479] ? mm_update_next_owner+0x680/0x680 [ 50.648122] ? tls_sw_push_pending_record+0x10/0x10 [ 50.653112] ? get_signal+0x2ba/0x1970 [ 50.657058] ? _raw_spin_unlock_irq+0x27/0x90 [ 50.661642] ? get_signal+0x2ba/0x1970 [ 50.665520] do_group_exit+0xf8/0x2c0 [ 50.669315] get_signal+0x30b/0x1970 [ 50.673363] ? __sys_sendto+0x28d/0x2e0 [ 50.677320] do_signal+0x87/0x1870 [ 50.681096] ? kasan_check_write+0x14/0x20 [ 50.685672] ? __mutex_unlock_slowpath+0xe8/0x6a0 [ 50.690493] ? setup_sigcontext+0x7d0/0x7d0 [ 50.695068] ? __sb_end_write+0xa4/0xd0 [ 50.699026] ? kasan_check_write+0x14/0x20 [ 50.704015] ? fput+0x18/0x120 [ 50.707190] ? ksys_write+0x1ce/0x260 [ 50.711004] ? exit_to_usermode_loop+0x3a/0x1e0 [ 50.715652] ? do_syscall_64+0x413/0x4e0 [ 50.719772] ? lockdep_hardirqs_on+0x3bb/0x5b0 [ 50.724774] ? exit_to_usermode_loop+0x3a/0x1e0 [ 50.729506] ? trace_hardirqs_on+0x28/0x190 [ 50.733829] exit_to_usermode_loop+0x159/0x1e0 [ 50.738646] do_syscall_64+0x413/0x4e0 [ 50.742638] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 50.747818] RIP: 0033:0x4645a9 [ 50.750992] Code: Bad RIP value. [ 50.754564] RSP: 002b:00007f29d197c198 EFLAGS: 00000246 ORIG_RAX: 000000000000002c [ 50.762702] RAX: 0000000000004000 RBX: 0000000000000000 RCX: 00000000004645a9 [ 50.770431] RDX: 00000000e0ffffff RSI: 00000000200005c0 RDI: 0000000000000003 [ 50.778649] RBP: 000000000051d8e0 R08: 0000000000000000 R09: 00000000000000d8 [ 50.786437] R10: 0000000000000000 R11: 0000000000000246 R12: 000000000055bf00 [ 50.793870] R13: 00007f29d197c6bc R14: 0000000000000005 R15: 0000000000000001 [ 50.801120] Modules linked in: [ 50.804339] invalid opcode: 0000 [#2] PREEMPT SMP KASAN [ 50.810582] CPU: 0 PID: 7298 Comm: syz-executor.3 Tainted: G B D 4.19.201-syzkaller #0 [ 50.819850] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 50.829387] RIP: 0010:tls_sk_proto_close+0x63e/0x980 [ 50.835271] Code: 5f 7c ff 48 8b b5 50 ff ff ff 4c 89 ff 48 8b 85 58 ff ff ff ff d0 e9 0c ff ff ff 48 c7 c6 00 be c9 87 4c 89 f7 e8 32 b8 b1 fb <0f> 0b be 00 00 10 00 4c 89 ff e8 63 ce 7b ff e9 8e fd ff ff 49 8d [ 50.854257] RSP: 0018:ffff8881edfcf860 EFLAGS: 00010246 [ 50.859614] RAX: dffffc0000000000 RBX: ffff8881d406c0c0 RCX: 0000000000000001 [ 50.866886] RDX: 1ffffd4000f6dec7 RSI: 0000000000000000 RDI: ffffea0007b6f638 [ 50.874306] RBP: ffff8881edfcf920 R08: ffffed103ed05081 R09: ffffed103ed05080 [ 50.878100] ---[ end trace 4efb06e4d50fb705 ]--- [ 50.881566] R10: ffffed103ed05080 R11: ffff8881f6828407 R12: ffff8881d2226fe0 [ 50.881568] R13: dffffc0000000000 R14: ffffea0007b6f600 R15: ffff8881d4f50ec0 [ 50.881572] FS: 00007f8052add700(0000) GS:ffff8881f6800000(0000) knlGS:0000000000000000 [ 50.881574] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 50.881576] CR2: 000055a30e239e28 CR3: 000000000846d005 CR4: 00000000001606f0 [ 50.881581] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 50.881583] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 50.881586] Call Trace: [ 50.881596] ? tcp_check_oom+0x4b0/0x4b0 [ 50.881602] ? tls_write_space+0x2b0/0x2b0 [ 50.881610] inet_release+0xb4/0x1b0 [ 50.881617] inet6_release+0x46/0x60 [ 50.886377] RIP: 0010:tls_sk_proto_close+0x63e/0x980 [ 50.893668] __sock_release+0xc2/0x290 [ 50.893673] sock_close+0x10/0x20 [ 50.893679] __fput+0x249/0x7f0 [ 50.893684] ____fput+0x9/0x10 [ 50.893690] task_work_run+0x108/0x180 [ 50.893696] do_exit+0xa6a/0x2d90 [ 50.893702] ? mm_update_next_owner+0x680/0x680 [ 50.893709] ? tls_sw_push_pending_record+0x10/0x10 [ 50.893715] ? get_signal+0x2ba/0x1970 [ 50.893721] ? _raw_spin_unlock_irq+0x27/0x90 [ 50.893724] ? get_signal+0x2ba/0x1970 [ 50.893728] do_group_exit+0xf8/0x2c0 [ 50.893732] get_signal+0x30b/0x1970 [ 50.893737] ? __sys_sendto+0x28d/0x2e0 [ 50.893746] do_signal+0x87/0x1870 [ 50.893753] ? kasan_check_write+0x14/0x20 [ 50.893756] ? __mutex_unlock_slowpath+0xe8/0x6a0 [ 50.893761] ? setup_sigcontext+0x7d0/0x7d0 [ 50.893767] ? __sb_end_write+0xa4/0xd0 [ 50.893772] ? kasan_check_write+0x14/0x20 [ 50.893774] ? fput+0x18/0x120 [ 50.893778] ? ksys_write+0x1ce/0x260 [ 50.893784] ? exit_to_usermode_loop+0x3a/0x1e0 [ 50.893787] ? do_syscall_64+0x413/0x4e0 [ 50.893791] ? lockdep_hardirqs_on+0x3bb/0x5b0 [ 50.893795] ? exit_to_usermode_loop+0x3a/0x1e0 [ 50.893800] ? trace_hardirqs_on+0x28/0x190 [ 50.893804] exit_to_usermode_loop+0x159/0x1e0 [ 50.893808] do_syscall_64+0x413/0x4e0 [ 50.893813] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 50.893817] RIP: 0033:0x4645a9 [ 50.893825] Code: Bad RIP value. [ 50.893827] RSP: 002b:00007f8052add198 EFLAGS: 00000246 ORIG_RAX: 000000000000002c [ 50.893831] RAX: 0000000000004000 RBX: 0000000000000000 RCX: 00000000004645a9 [ 50.893833] RDX: 00000000e0ffffff RSI: 00000000200005c0 RDI: 0000000000000003 [ 50.893835] RBP: 000000000051d8e0 R08: 0000000000000000 R09: 00000000000000d8 [ 50.893837] R10: 0000000000000000 R11: 0000000000000246 R12: 000000000055bf00 [ 50.893840] R13: 00007f8052add6bc R14: 0000000000000005 R15: 0000000000000001 [ 50.893847] Modules linked in: [ 50.911108] Code: 5f 7c ff 48 8b b5 50 ff ff ff 4c 89 ff 48 8b 85 58 ff ff ff ff d0 e9 0c ff ff ff 48 c7 c6 00 be c9 87 4c 89 f7 e8 32 b8 b1 fb <0f> 0b be 00 00 10 00 4c 89 ff e8 63 ce 7b ff e9 8e fd ff ff 49 8d [ 50.948624] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 50.955772] ---[ end trace 4efb06e4d50fb706 ]--- [ 50.959301] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 50.963254] RIP: 0010:tls_sk_proto_close+0x63e/0x980 [ 50.965714] RSP: 0018:ffff8881edf97860 EFLAGS: 00010246 [ 50.968709] Code: 5f 7c ff 48 8b b5 50 ff ff ff 4c 89 ff 48 8b 85 58 ff ff ff ff d0 e9 0c ff ff ff 48 c7 c6 00 be c9 87 4c 89 f7 e8 32 b8 b1 fb <0f> 0b be 00 00 10 00 4c 89 ff e8 63 ce 7b ff e9 8e fd ff ff 49 8d [ 50.975552] RAX: dffffc0000000000 RBX: ffff8881e969f000 RCX: 0000000000000000 [ 50.980549] RSP: 0018:ffff8881edf97860 EFLAGS: 00010246 [ 50.986689] RDX: 1ffffd4000e93f87 RSI: 0000000000000000 RDI: ffffea000749fc38 [ 50.987286] RAX: dffffc0000000000 RBX: ffff8881e969f000 RCX: 0000000000000000 [ 50.992860] RBP: ffff8881edf97920 R08: ffffed103ed23eef R09: ffffed103ed23eee [ 50.997884] RDX: 1ffffd4000e93f87 RSI: 0000000000000000 RDI: ffffea000749fc38 [ 51.002650] R10: ffffed103ed23eee R11: ffff8881f691f777 R12: ffff8881ee284c20 [ 51.004951] RBP: ffff8881edf97920 R08: ffffed103ed23eef R09: ffffed103ed23eee [ 51.008675] R13: dffffc0000000000 R14: ffffea000749fc00 R15: ffff8881d996ce00 [ 51.008679] FS: 00007f29d197c700(0000) GS:ffff8881f6900000(0000) knlGS:0000000000000000 [ 51.008681] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 51.008684] CR2: 00007fcd33522f88 CR3: 000000000846d002 CR4: 00000000001606e0 [ 51.008690] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 51.008693] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 51.008697] Kernel panic - not syncing: Fatal exception [ 51.013084] Kernel Offset: disabled [ 51.325760] Rebooting in 86400 seconds..